Showing 461 - 480 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 461
  2. 462

    Robust image hiding algorithm for secure multimodal biometrics by Yu-qiang CAO, Wei-guo GONG, Sen BAI

    Published 2016-09-01
    “…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
    Get full text
    Article
  3. 463

    A Novel FM-DCSK Secure Communication System by Gang Zhang, Yuan Wang, Ying Wang

    Published 2015-01-01
    Subjects: “…chaos secure communication…”
    Get full text
    Article
  4. 464
  5. 465
  6. 466

    Secure cross-domain communication mechanism for Web mashups by Jian-hua SUN, Zhi-rong LIU, Hao CHEN

    Published 2012-06-01
    “…Many methods were used in cross-domain communication,whereas they were hardly to meet the security and high performance requirements.To this end,a secure cross-domain communication(SCDC)mechanism was proposed for Web mashups.It encapsulates content from different trust domains as secure components,achieves cross-domain communication with layered communication stack,and shares fine-grained objects by wrapping objects.SCDC mechanism supports secure cross-domain communication,shares objects between mashups and components without any browser modifications.Experiments show that the mechanism improves the communication efficiency more than five-fold,and only incurs limited overhead.…”
    Get full text
    Article
  7. 467
  8. 468
  9. 469
  10. 470

    Research of public infrastructure system and security policy in cyberspace by Jie QIU, Rui HAN, Zhifeng WEI, Zhiyang WANG

    Published 2021-12-01
    “…Considering the key elements, such as object, resources, activities, and other equipment, as same as system, data, environmental and other aspects of demand, the public infrastructure system and security policy between physical space and cyberspace were taken as a basic point.A scientific system of public infrastructure in cyberspace was constructed.From the perspective of dual authentication of management authentication and application authentication, some corresponding safety policies and implementation suggestions were given from the aspects of user/device management and identity authentication.…”
    Get full text
    Article
  11. 471

    Sustainable intensification of agriculture: the foundation for universal food security by Glenn Denning

    Published 2025-01-01
    “…To achieve universal food security, SI must be accompanied by complementary investments in market infrastructure, postharvest stewardship, healthy diets, and social protection. …”
    Get full text
    Article
  12. 472
  13. 473
  14. 474
  15. 475
  16. 476

    Framework for Secure Wireless Communication in Wireless Sensor Networks by Muhammad Usama, Fahad T. Bin Muhaya

    Published 2013-12-01
    “…With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. …”
    Get full text
    Article
  17. 477
  18. 478
  19. 479

    Securing Bird Feeders from Florida Black Bears by Ethan T. Noel, Elizabeth F. Pienaar

    Published 2017-05-01
    “…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
    Get full text
    Article
  20. 480