Showing 521 - 540 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 521

    Host security assessment method based on attack graph by Hongyu YANG, Haihang YUAN, Liang ZHANG

    Published 2022-02-01
    Subjects: “…host security…”
    Get full text
    Article
  2. 522
  3. 523
  4. 524
  5. 525
  6. 526
  7. 527
  8. 528

    Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation by Yi Sun, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, Wenmin Li

    Published 2014-01-01
    “…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
    Get full text
    Article
  9. 529

    Translocality, Remittances, and Food Security in the Ghana-Qatar Migration Corridor by Bernard Owusu, Jonathan Crush

    Published 2025-01-01
    “…The findings reveal that cash remittances play a crucial role in enhancing food security and the overall welfare of households in Ghana. …”
    Get full text
    Article
  10. 530
  11. 531
  12. 532

    Secure IoT data dissemination with blockchain and transfer learning techniques by Pooja Anand, Yashwant Singh, Harvinder Singh

    Published 2025-01-01
    “…However, most existing systems for storing and disseminating IoT data streams lack reliability, security, and transparency, primarily due to centralized architectures that create single points of failure. …”
    Get full text
    Article
  13. 533
  14. 534
  15. 535
  16. 536
  17. 537
  18. 538
  19. 539
  20. 540

    Characteristics of security risks of large industrial investments and their management principles by Frigyes Gubics

    Published 2025-01-01
    Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
    Get full text
    Article