Showing 4,121 - 4,140 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4121
  2. 4122
  3. 4123
  4. 4124

    A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature by Kalpana Samal, Shanta Kumari Sunanda, Debasish Jena, Srikanta Patnaik

    Published 2025-01-01
    “…This research proposes a protocol for secure authentication of IoMT devices while protecting user privacy. …”
    Get full text
    Article
  5. 4125
  6. 4126

    CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm by YANG Yatao, CHANG Xin, SHI Haopeng, WANG Wei, WANG Ke

    Published 2024-07-01
    “…This scheme aimed to enhance security and could resist quantum computing attacks. …”
    Get full text
    Article
  7. 4127

    Multiobjectives for Optimal Geographic Routing in IoT Health Care System by K. Aravind, Praveen Kumar Reddy Maddikunta

    Published 2022-01-01
    “…The IoT network is wireless, which leads to security breaches. Therefore, there is a necessity to have a secured data transmission in the context of healthcare. …”
    Get full text
    Article
  8. 4128

    Enhancing network lifetime in WSNs through coot algorithm-based energy management model by Namita Shinde, Dr. Vinod H․ Patil

    Published 2025-06-01
    “…This addresses issues such as high energy consumption, communication delays, and security.To ensure energy savings and network reliability, the fitness function evaluates cluster heads and best routes based on constraints.COOT outperforms other Metaheuristics Algorithms like Butterfly Optimization Algorithm, Genetic Algorithm, Tunicate Swarm Gray Wolf Optimization Algorithm, and Bird Swarm Algorithm in simulation with performance measurements and enhancing network functionality and protection.Key methodology points include: • Proposed a multiple constraints clustering and routing technique using COAto solve the most crucial issues that arise in WSNs. • Integrated an advanced fitness function that determines cluster head selection, and the routing path based on residual energy, delay, security, trust, distance, and link quality so that energy load is evenly distributed and credible data flow is maintained across the network and made Innovative and Effective Solution. • Proven Results Demonstrated superior network performance, achieving the lowest delay, highest network lifetime (3571 rounds) and enhanced security (0.8) and trust (0.6) compared to existing algorithms with less energy consumption, making it the most suitable solution for WSN performance improvement.…”
    Get full text
    Article
  9. 4129

    The Role of Cognitive Science and Big Data Technology in the Design of Business Information Management Systems by Yangfan Li

    Published 2022-01-01
    “…For the application scenario of multitenant distributed data access, a data transparent security management model is proposed. Simulation experiments show that this method can realize data security management when the performance loss is controlled within an acceptable range. …”
    Get full text
    Article
  10. 4130

    TBAS: Token-based authorization service architecture in Internet of things scenarios by Shih-Hsiung Lee, Ko-Wei Huang, Chu-Sing Yang

    Published 2017-07-01
    “…The advantages of this framework are practical and secure which are explained in the experimental chapter.…”
    Get full text
    Article
  11. 4131

    THE LEVEL OF USING PAYMENT INSTRUMENTS IN THE TRANSFER OF DIGITAL CURRENCY by Nicoleta PANAIT, Mădălina RĂDOI

    Published 2024-05-01
    “…The convenience, security and cost efficiency they offer have led to their widespread adoption in various industries. …”
    Get full text
    Article
  12. 4132

    AN EXAMINATION OF THE IMPACT OF NATIONAL DEFENCE STRATEGY ON THE WAR AGAINST INSURGENCY IN NIGERIA. A STUDY OF IGABI LOCAL GOVERNMENT AREA IN KADUNA STATE. 2016– 2023 by MOHAMMED KABEER GARBA, PROFESSOR USMAN Muhammed

    Published 2024-06-01
    “… The growing challenges in Nigeria’s National Security hasbecome a major threat to the overall well-being of everyone living in Nigeria, neighbouring countries and her sovereignty in general. …”
    Get full text
    Article
  13. 4133

    Searchable encryption scheme based on attribute policy hiding in a cloud environment by Yihua ZHOU, Xinyu HU, Meiqi LI, Yuguang YANG

    Published 2022-04-01
    “…Attribute-based searchable encryption technology can achieve fine-grained access control of data, but the existing searchable encryption scheme, keyword search, access control and file encryption are basically performed separately, causing the attacker to directly skip the access policy for keyword index matching and file decryption.Besides, the data owners in the existing schemes need to pass the key of the encrypted file to the user in a secure channel, which increases the cost of the data owner.Furthermore, most tree-based access control policies are open and easy to cause privacy leakage.Therefore, based on the LSSS (linear secret sharing schemes) access architecture, the searchable encryption scheme based on attribute policy hiding in a cloud environment was proposed.Through the embedding of policy secret values into keyword encryption and file storage encryption, the combination of access control, keyword search and file encryption were realized.The aggregate key technology enables users to decrypt files without interacting with the data owner, reducing the burden of key management and increasing storage space by approximately 30%.The experimental results and security analysis show that the proposed scheme guarantees the security of stored data, privacy of access strategy and non-connectivity of trap gate.Compared with the existing mainstream scheme, the retrieval efficiency of the proposed scheme has improved to more than 20%.…”
    Get full text
    Article
  14. 4134

    DEFENSE COOPERATION IN EUROPE: SUBREGIONAL LEVEL by Y. I. Nadtochey

    Published 2016-06-01
    “…The evolution of subregional cooperation among European nations in security and defense area is the topic of the article. …”
    Get full text
    Article
  15. 4135

    Growing together: unveiling the potential of school-based community gardens to foster well-being, empowerment, and sustainability by Tinashe Paul Kanosvamhira

    Published 2025-01-01
    “…The research contends that school-based community gardens can wield significant influence in enhancing food security and nutrition, catalyzing community development, and nurturing environmental sustainability. …”
    Get full text
    Article
  16. 4136

    Improving dependability with low power fault detection model for skinny-hash. by Sonal Arvind Barge, Gerardine Immaculate Mary

    Published 2024-01-01
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
    Get full text
    Article
  17. 4137

    Enhancing Amarath Growth and Yield in Kabale District. by Tumwine, David

    Published 2024
    “…Amaranth, a highly nutritious and versatile crop, has emerged as a promising solution to food security and malnutrition challenges, particularly in regions like Kabale District in Uganda. …”
    Get full text
    Thesis
  18. 4138

    Spousal Individual Retirement Accounts by Lisa Leslie

    Published 2014-11-01
    “… A spouse who stays at home to take care of children or other dependents is likely to have reduced Social Security benefits and will not have access to a workplace retirement plan. …”
    Get full text
    Article
  19. 4139
  20. 4140

    Analysis of the existing methods of change of liquid glass properties by D. M. Koukoui, N. V. Andrianov

    Published 2000-11-01
    “…The authors list methods of modification of silicate binding agent with the purpose to secure high quality of castings and ecological cleanliness.…”
    Get full text
    Article