Showing 341 - 360 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 341
  2. 342
  3. 343
  4. 344
  5. 345

    «Human Security»: Concept, Political Discourse, and Ways of Implimintation by A. V. Khudaykulova

    Published 2010-12-01
    “…На фоне существования множес- тва трактовок human security наиболее адекватно её смысл передаёт термин безопасность личности. …”
    Get full text
    Article
  6. 346
  7. 347
  8. 348

    Provably secure social network privacy-preserving scheme by Jian-qiong HE, You-liang TIAN, Kai ZHOU

    Published 2016-08-01
    Subjects: “…provable secure…”
    Get full text
    Article
  9. 349

    Secure Localization in Wireless Sensor Networks with Mobile Beacons by Ting Zhang, Jingsha He, Hong Yu

    Published 2012-10-01
    “…We present a scheme, called SLMB, for secure sensor localization in WSNs in which we propose to use a mobile beacon node with the goal of reducing the overall energy consumption in sensor nodes during sensor localization. …”
    Get full text
    Article
  10. 350
  11. 351

    THE PERSPECTIVES OF INTERNATIONAL REGULATION OF PRIVATE MILITARY AND SECURITY COMPANIES’ by M. A. Nebolsina, A. I. Nikitin

    Published 2016-04-01
    Subjects: “…private military and security companies…”
    Get full text
    Article
  12. 352
  13. 353
  14. 354

    Security analysis and improvement of a certificateless signcryption scheme by Zhen-guo ZHAO

    Published 2015-03-01
    “…To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently,Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. A strongly secure certificateless signcryption without bilinear pairings was also proposed, which was provably secure in the random oracle model under the assumption that the discrete logarithm problem and the computational Diffie-Hellman problems were intractable. …”
    Get full text
    Article
  15. 355

    Modified security model based on dynamic trusted degree by NIE Xiao-wei1, FENG Deng-guo1

    Published 2008-01-01
    Subjects: “…security architecture…”
    Get full text
    Article
  16. 356

    Improving the information security sustainability of the economy financial sector by V. V. Kachurin, R. G. Akhmadeev

    Published 2023-06-01
    “…The study analyzes the main activities of Russia Bank, aimed at ensuring the sustainability of information security in the financial sector of the economy, as well as ongoing activities aimed at limiting the spread of cybercrime based on an automated incident handling system. …”
    Get full text
    Article
  17. 357

    Systematic literature review on Internet-of-Vehicles communication security by Manar Abu Talib, Sohail Abbas, Qassim Nasir, Mohamad Fouzi Mowakeh

    Published 2018-12-01
    “…As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. …”
    Get full text
    Article
  18. 358
  19. 359
  20. 360