Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3461
The dynamics of African indigenous knowledge systems : a sustainable alternative for livelihoods in southern Africa /
Published 2022Table of Contents: “…Introduction: The dynamics of indigenous knowledges and sustainable livelihoods in Africa / Edward Shizha and Christopher Ndlovu -- Mainstreaming and investing in indigenous knowledge epistemologies for sustainable livelihoods / Edward Shizha -- Buttressing sustainable security systems through African indigenous epistemologies / Shepherd Ndondo and Christopher Ndlovu -- Harnessing indigenous conflict resolution processes in building sustainable communities / Mandlenkosi Ndlovu -- Participation of diasporas in building sustainable communities in Zimbabwe: Implementation of Ubuntu philosophy / Roland Moyo, Christopher Ndlovu and Edward Shizha -- The role of indigenous knowledge systems in sustainable adaptation to climate change / Tinashe Pikirai -- Understanding climate change adaptation for increased productivity and sustainability in Southern African communities: A review / Keith Phiri -- Implementing indigenous knowledge systems for sustainable learning in African primary schools / Emily Mangwaya and Ezron Mangwaya -- Integration of indigenous mathematical knowledge into the mathematics education for sustainable learning / Nhlanhla Mkwelie, Ntandoyenkosi Satamwe and Edward Shizha -- Embedding sustainability and Ubuntu philosophy in the learning of learners with disruptive behaviours / Mlungisi Moyo -- Language of instruction imbroglio in the post-colonial school curriculum (Zimbabwe Curriculum Framework, 2015-2020): The obstacle to sustainable learning / Otildah S. …”
View in OPAC
eBook -
3462
Advanced Automotive Fault Diagnosis : automotive technology : vehicle maintenance and repair /
Published 2017Table of Contents: “…In-car entertainment security and communications - 8.9. Diagnostics - ice, security and communications - 8.10. …”
View in OPAC
Book -
3463
-
3464
Detecting Unauthorized Movement of Radioactive Material Packages in Transport with an Adam-Optimized BP Neural Network Model
Published 2023-01-01“…IAEA’s “Security of Radioactive Materials in Transport” (Nuclear Security Series No. 9-G) mandates that an effective transport security system should provide immediate detection of any unauthorized removal of the packages. …”
Get full text
Article -
3465
-
3466
Privacy-preserving multi-attribute reverse spectrum auction scheme
Published 2020-09-01“…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
Get full text
Article -
3467
An Analysis of Destructive Fishing as an Anthropogenic Disaster in Coastal Areas
Published 2025-01-01“…These practices damage marine resource ecosystems, disrupt economies, compromise human security, and threaten national security in coastal regions. …”
Get full text
Article -
3468
Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment
Published 2025-01-01“…The evaluation metrics like as NACI, UACI, Entropy and standard verification methods such as NIST standard tests are deployed and analyzed. To prove it security strength, proposed secured BC framework is compared with the wide-variety of secured frameworks. …”
Get full text
Article -
3469
Automating Risk Analysis of Software Design Models
Published 2014-01-01“…Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. …”
Get full text
Article -
3470
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
Published 2025-01-01“…Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience. This study presents a comprehensive review of BT applications in OT security for food and agriculture CI, employing bibliometric and content analysis methods. …”
Get full text
Article -
3471
The Joint Research Centre’s Expertise in Nuclear Safeguards Sample Analysis
Published 2025-01-01Get full text
Article -
3472
Attribution and Risk Projections of Hydrological Drought Over Water‐Scarce Central Asia
Published 2025-01-01Get full text
Article -
3473
Towards edge-collaborative, lightweight and privacy-preserving classification framework
Published 2022-01-01“…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
Get full text
Article -
3474
Sécurité aux frontières : Portée et limites de la stratégie algérienne
Published 2016-06-01“…This article analyzes the Algerian State’s border security strategy. Their increasing instability forces it to be one of the most involved actors in the maintenance of regional security. …”
Get full text
Article -
3475
A trusted IoT architecture model
Published 2017-10-01“…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
Get full text
Article -
3476
Speedup signing: pre-rejection sampling towards dilithium
Published 2025-02-01“…Abstract Security and efficiency have always been two critical factors in the development of post-quantum digital signatures. …”
Get full text
Article -
3477
ID-based wireless authentication scheme with anonymity
Published 2009-01-01“…Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.…”
Get full text
Article -
3478
The role of religious values in extending social protection: a South African perspective
Published 2008-06-01“…In addition, the article investigates the nature of the relationship between informal coping mechanisms (such as those in AICs) and formal social security, i.e. whether informal social security strengthens or weakens formal social security. …”
Get full text
Article -
3479
Application on Wireless Sensor Networks in Domestic and Hostile Environment
Published 2022-09-01“…So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. …”
Get full text
Article -
3480
ID-based ring signature on prime order group from asymmetric pairing
Published 2021-09-01“…For the problem that the security proof was difficult to be realized under the standard model in the existing ID-based ring signature schemes, an ID-based ring signature scheme proven secure in the standard model was proposed.Firstly, the formal definitions of security model and adversary model of ID-based ring signature were given.Then, a specific ID-based ring signature scheme was constructed on the prime order groups from asymmetric pairings.Finally, the security analysis and performance analysis were given.The results of security analysis show that the proven security of the proposed scheme is achieved under the standard model by using the dual system encryption technique.The results of performance analysis show that the operation efficiency of each algorithm in the proposed scheme is improved effectively, compared with existing ID-based ring signature schemes from dual system, it is shorter to take the time in generating and verifying signature.…”
Get full text
Article