Showing 4,301 - 4,320 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 4301

    Fiscal Decentralisation and Services Delivery in Mbarara Central Market. by Ainembabazi, Blair

    Published 2024
    “…Although fiscal decentralization is often promoted as a means to enhance local governance and improve service provision, its actual impact on security, sanitation, and utility services is not well understood. …”
    Get full text
    Thesis
  2. 4302

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
    Get full text
    Article
  3. 4303

    Research on secret key generation based on wireless channel characteristics in body area network by Jingjing HUANG

    Published 2021-12-01
    “…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
    Get full text
    Article
  4. 4304

    Public key based key distribution scheme for wireless sensor networks by HUANG Jie1, HUANG Bei1

    Published 2011-01-01
    “…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public key set and a hash function in base station.Each sensor device was pre-distributed one public/private pair-wise key from public key set and a public key subset from the initial public keys set.Owing to uniqueness of private key,not only the communication security problems could be improved for WSN.but also the sensor-memory cost could be decreased.With the theorem of random-graph theory,the connectivity and scalability were illustrated.The results showed that the scheme was superior to the traditional key pre-distribution schemes.…”
    Get full text
    Article
  5. 4305

    Éducation à la défense et enseignement de l’histoire des guerres by Sylvain Doussot

    Published 2018-06-01
    “…This paper aims to deal with the relation between values and knowledge in history teaching (especially of wars) and defense and security education. This defense education is questioned through the two traditional (and potentially contradictory) aims of history teaching: building a common culture and teaching critical historical thinking. …”
    Get full text
    Article
  6. 4306

    Overview of searchable encryption research by Ying LI, Chunguang MA

    Published 2018-07-01
    “…With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.…”
    Get full text
    Article
  7. 4307

    An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks by Ju Ren, Yaoxue Zhang, Kang Liu

    Published 2013-04-01
    “…While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. …”
    Get full text
    Article
  8. 4308
  9. 4309
  10. 4310

    Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010 by Whisnu Yudha Aditama, Ira Rosianal Hikmah, Dimas Febriyan Priambodo

    Published 2023-08-01
    “…In addition, three applications have the same level of security in securing user data from unauthorized parties, and implement the use of digital signatures or certificates to prevent denial. …”
    Get full text
    Article
  11. 4311

    Blockchain and Artificial Intelligence for Decentralized Edge Environments by Yuansong Qiao

    Published 2025-01-01
    “…Edge environments typically involve multiple stakeholders and the management of decentralized devices and resources, presenting significant challenges related to the assurance of data security, real-time processing, and efficient coordination [...]…”
    Get full text
    Article
  12. 4312

    Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions by Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci

    Published 2024-01-01
    “…Among the most recurrent themes are IoT and blockchain integration in supply chain management and blockchain in healthcare data management and security, indicating the significant potential of this convergence to transform supply chains and secure healthcare data. …”
    Get full text
    Article
  13. 4313

    High-Risk AI Systems—Lie Detection Application by Konstantinos Kalodanis, Panagiotis Rizomiliotis, Georgios Feretzakis, Charalampos Papapavlou, Dimosthenis Anagnostopoulos

    Published 2025-01-01
    “…Integrating artificial intelligence into border control systems may help to strengthen security and make operations more efficient. For example, the emerging application of artificial intelligence for lie detection when inspecting passengers presents significant opportunities for future implementation. …”
    Get full text
    Article
  14. 4314

    Deep BiLSTM Attention Model for Spatial and Temporal Anomaly Detection in Video Surveillance by Sarfaraz Natha, Fareed Ahmed, Mohammad Siraj, Mehwish Lagari, Majid Altamimi, Asghar Ali Chandio

    Published 2025-01-01
    “…Detection of anomalies in video surveillance plays a key role in ensuring the safety and security of public spaces. The number of surveillance cameras is growing, making it harder to monitor them manually. …”
    Get full text
    Article
  15. 4315

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
    Get full text
    Article
  16. 4316

    Supply risk propagation in international trade networks of the tungsten industry chain by Xinxin Zheng, Huajiao Li, Xiaojie Liu, Xingxing Wang, Yuqi Zhang, Qianyong Tang, Bo Ren

    Published 2025-01-01
    “…The results can provide reference and decision support for different economies to secure the supply security and sustainability of tungsten resources.…”
    Get full text
    Article
  17. 4317

    Analysing the Multidimensional Nature of Poverty: a Focus on Housing Insecurity in South Africa by Zamokuhle Ndaba, Steven Henry Dunga, Precious Mncayi-Makhanya

    Published 2024-12-01
    “…Be that as it may, the Sustainable Development Goals evidently have one critical aspect missing in its 17 goals: achieving housing security for all. Goal 11 mentions urban settlement but fails to understand the concept of housing security. …”
    Get full text
    Article
  18. 4318

    Food-Insecure Women Eat a Less Diverse Diet in a More Temporally Variable Way: Evidence from the US National Health and Nutrition Examination Survey, 2013-4 by Daniel Nettle, Melissa Bateson

    Published 2019-01-01
    “…Previous research using food recalls suggests that the total energy intake of food-insecure women is not elevated, though macronutrient composition may differ from that of food-secure women. There is limited evidence on temporal patterns of food consumption. …”
    Get full text
    Article
  19. 4319

    Pressure and rolling torque in high-speed finishing blocks of wire mills with account of mass forces in deformation zones by A. A. Gorbanev, S. M. Zhuchkov, V. V. Filippov, V. A. Tischenko, A. B. Steblov

    Published 2001-08-01
    “…Tasks of working out of theoretical bases of continuos high-speed rolling of rolled wire are set forth and solved with considerańon of influence of mass forces securing necessary acceleration in deformation zones.…”
    Get full text
    Article
  20. 4320

    BRICS in a world at crossroads? by Siphamandla Zondi, Norman Sempijja, Thulisile Mphambukeli

    Published 2022-08-01
    “…In the process, the west has threatened the strategic security of Russia and Russia has also flouted the national sovereignty of its western neighbours that the West tries to use to bring Russia into submission. …”
    Get full text
    Article