Showing 3,461 - 3,480 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 3461

    The dynamics of African indigenous knowledge systems : a sustainable alternative for livelihoods in southern Africa /

    Published 2022
    Table of Contents: “…Introduction: The dynamics of indigenous knowledges and sustainable livelihoods in Africa / Edward Shizha and Christopher Ndlovu -- Mainstreaming and investing in indigenous knowledge epistemologies for sustainable livelihoods / Edward Shizha -- Buttressing sustainable security systems through African indigenous epistemologies / Shepherd Ndondo and Christopher Ndlovu -- Harnessing indigenous conflict resolution processes in building sustainable communities / Mandlenkosi Ndlovu -- Participation of diasporas in building sustainable communities in Zimbabwe: Implementation of Ubuntu philosophy / Roland Moyo, Christopher Ndlovu and Edward Shizha -- The role of indigenous knowledge systems in sustainable adaptation to climate change / Tinashe Pikirai -- Understanding climate change adaptation for increased productivity and sustainability in Southern African communities: A review / Keith Phiri -- Implementing indigenous knowledge systems for sustainable learning in African primary schools / Emily Mangwaya and Ezron Mangwaya -- Integration of indigenous mathematical knowledge into the mathematics education for sustainable learning / Nhlanhla Mkwelie, Ntandoyenkosi Satamwe and Edward Shizha -- Embedding sustainability and Ubuntu philosophy in the learning of learners with disruptive behaviours / Mlungisi Moyo -- Language of instruction imbroglio in the post-colonial school curriculum (Zimbabwe Curriculum Framework, 2015-2020): The obstacle to sustainable learning / Otildah S. …”
    View in OPAC
    eBook
  2. 3462

    Advanced Automotive Fault Diagnosis : automotive technology : vehicle maintenance and repair / by Denton, Tom

    Published 2017
    Table of Contents: “…In-car entertainment security and communications - 8.9. Diagnostics - ice, security and communications - 8.10. …”
    View in OPAC
    Book
  3. 3463
  4. 3464

    Detecting Unauthorized Movement of Radioactive Material Packages in Transport with an Adam-Optimized BP Neural Network Model by Panpan Jiang, Xiaohua Yang, Yaping Wan, Tiejun Zeng, Mingxing Nie, Chaofeng Wang, Yu Mao, Zhenghai Liu

    Published 2023-01-01
    “…IAEA’s “Security of Radioactive Materials in Transport” (Nuclear Security Series No. 9-G) mandates that an effective transport security system should provide immediate detection of any unauthorized removal of the packages. …”
    Get full text
    Article
  5. 3465
  6. 3466

    Privacy-preserving multi-attribute reverse spectrum auction scheme by Jiaqi WANG, Ning LU, Qingfeng CHENG, Zhaoxia WU, Wenbo SHI

    Published 2020-09-01
    “…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
    Get full text
    Article
  7. 3467

    An Analysis of Destructive Fishing as an Anthropogenic Disaster in Coastal Areas by Yunias Dao, Yusnaldi, Kusuma

    Published 2025-01-01
    “…These practices damage marine resource ecosystems, disrupt economies, compromise human security, and threaten national security in coastal regions. …”
    Get full text
    Article
  8. 3468

    Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment by Goli Archana, Rajeev Goyal, K. M. V. Madan Kumar

    Published 2025-01-01
    “…The evaluation metrics like as NACI, UACI, Entropy and standard verification methods such as NIST standard tests are deployed and analyzed. To prove it security strength, proposed secured BC framework is compared with the wide-variety of secured frameworks. …”
    Get full text
    Article
  9. 3469

    Automating Risk Analysis of Software Design Models by Maxime Frydman, Guifré Ruiz, Elisa Heymann, Eduardo César, Barton P. Miller

    Published 2014-01-01
    “…Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. …”
    Get full text
    Article
  10. 3470

    A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure by Chengliang Zheng, Xiangzhen Peng, Ziyue Wang, Tianyu Ma, Jiajia Lu, Leiyang Chen, Liang Dong, Long Wang, Xiaohui Cui, Zhidong Shen

    Published 2025-01-01
    “…Blockchain technology (BT) has emerged as a transformative solution for addressing these challenges by enhancing network security, traceability, and system resilience. This study presents a comprehensive review of BT applications in OT security for food and agriculture CI, employing bibliometric and content analysis methods. …”
    Get full text
    Article
  11. 3471
  12. 3472
  13. 3473

    Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN

    Published 2022-01-01
    “…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
    Get full text
    Article
  14. 3474

    Sécurité aux frontières : Portée et limites de la stratégie algérienne by Abdennour Benantar

    Published 2016-06-01
    “…This article analyzes the Algerian State’s border security strategy. Their increasing instability forces it to be one of the most involved actors in the maintenance of regional security. …”
    Get full text
    Article
  15. 3475

    A trusted IoT architecture model by Ansheng YIN, Shijun ZHANG

    Published 2017-10-01
    “…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
    Get full text
    Article
  16. 3476

    Speedup signing: pre-rejection sampling towards dilithium by Lianglin Yan, Ming Luo, Mingsheng Wang

    Published 2025-02-01
    “…Abstract Security and efficiency have always been two critical factors in the development of post-quantum digital signatures. …”
    Get full text
    Article
  17. 3477

    ID-based wireless authentication scheme with anonymity by ZHU Hui, LI Hui, SHU Wan-li, WANG Yu-min

    Published 2009-01-01
    “…Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.…”
    Get full text
    Article
  18. 3478

    The role of religious values in extending social protection: a South African perspective by L. G. Mpedi

    Published 2008-06-01
    “…In addition, the article investigates the nature of the relationship between informal coping mechanisms (such as those in AICs) and formal social security, i.e. whether informal social security strengthens or weakens formal social security. …”
    Get full text
    Article
  19. 3479

    Application on Wireless Sensor Networks in Domestic and Hostile Environment by lu fan

    Published 2022-09-01
    “…So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. …”
    Get full text
    Article
  20. 3480

    ID-based ring signature on prime order group from asymmetric pairing by Hongxia HOU, Mingrui ZHANG, Yanqi ZHAO, Xiaoli DONG

    Published 2021-09-01
    “…For the problem that the security proof was difficult to be realized under the standard model in the existing ID-based ring signature schemes, an ID-based ring signature scheme proven secure in the standard model was proposed.Firstly, the formal definitions of security model and adversary model of ID-based ring signature were given.Then, a specific ID-based ring signature scheme was constructed on the prime order groups from asymmetric pairings.Finally, the security analysis and performance analysis were given.The results of security analysis show that the proven security of the proposed scheme is achieved under the standard model by using the dual system encryption technique.The results of performance analysis show that the operation efficiency of each algorithm in the proposed scheme is improved effectively, compared with existing ID-based ring signature schemes from dual system, it is shorter to take the time in generating and verifying signature.…”
    Get full text
    Article