Showing 6,181 - 6,200 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 6181

    Main street retail districts or shopping centers? comparing the preferences of low-income consumers by Juracy Parente, Marcelo Moll Brandão, Ana Paula Miotto, Flávia Plutarco

    Published 2012-01-01
    “…While shopping malls received better evaluation on environment, infrastructure, variety of stores and security, the street districts were judged to be better regarding access and value. …”
    Get full text
    Article
  2. 6182

    An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks by Chen-Yang Cheng, Iuon-Chang Lin, Shu-Yan Huang

    Published 2015-09-01
    “…Furthermore, our scheme provides enough scalability and security. The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.…”
    Get full text
    Article
  3. 6183

    Multi-authority attribute-based identification scheme by Fei TANG, Jiali BAO, Yonghong HUANG, Dong HUANG, Huili WANG

    Published 2021-03-01
    “…Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance.…”
    Get full text
    Article
  4. 6184

    Electronic Records Management Practices and Academic Performance of Higher Institutions of Learning: A Case Study of Kabale University. by Tukahirwa, Elizabeth

    Published 2024
    “…The findings revealed a reliance on mass storage devices for data accumulation and a strong emphasis on security and privacy measures by the university. However, inefficiencies were noted due to limited system integration. …”
    Get full text
    Thesis
  5. 6185

    Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing by Fahmi Fachri

    Published 2023-02-01
    “…Penetration testing is defined as an official attempt to exploit the system with the aim of finding weaknesses in the web server and improving system security. This penetration test is carried out on a web server which is an Academic Information System at a university. …”
    Get full text
    Article
  6. 6186

    Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum by Muhammad Fajar Sidiq, Akbari Indra Basuki, Halim Firdaus, Muhammad Aldi Baihaqi

    Published 2020-12-01
    “…The existing researches are unable to provide a secure, centralized monitoring system that satisfies three security aspects, namely: availability, integrity, and confidentiality. …”
    Get full text
    Article
  7. 6187
  8. 6188
  9. 6189

    Evaluation of Ecosystem Services and Tradeoff and Synergy in the Alpine and Canyon Region of Southwest China Based on Multi-source Geographic Data by LIU Jing, XIANG Jiayi, ZHANG Donghai, LAN Mengyao, GUAN Yinghui

    Published 2024-12-01
    “…[Objective] The alpine and canyon region of Southwest China is a crucial ecological security barrier within the national “Three Zones and Four Belts” strategy, and it plays an essential role in ensuring national ecological security and promoting regional high-quality development. …”
    Get full text
    Article
  10. 6190

    Closed-loop systems for plants expressing animal proteins: a modernized framework to safeguard the future of agricultural innovation by Kristin A. Bresnahan, Justin M. Ferber, J. Thomas Carrato, Thomas J. Stoddard, Patrick V. Palad, Magi Richani

    Published 2025-01-01
    “…By implementing these rigorous systems, the PMF industry can realize its potential to contribute significantly to sustainable agriculture and food security.…”
    Get full text
    Article
  11. 6191
  12. 6192

    DIGITAL TOOLS FOR MATCHING QUALIFICATIONS TO THE LEVELS OF THE NATIONAL QUALIFICATIONS FRAMEWORK by Volodymyr Kovtunets, Sergiy Londar, Serhii Melnyk, Oles Kovtunets

    Published 2024-04-01
    “…For the most general case of four NQF descriptors, Microsoft Excel macro is developed to secure achieving any level of accuracy. Corresponding API is developed by PHP programming language. …”
    Get full text
    Article
  13. 6193

    Availibilty Pada Aplikasi mobile Banking: Case Study Bank XYZ by Malvin Edward Makahanap

    Published 2024-02-01
    “…Unavailability selama periode penelitian terjadi karena aktivitas product development, aktivitas terkait security, production issue, hardware issue dan 3rd party maintenance. …”
    Get full text
    Article
  14. 6194

    Theoretical Aspects of Professional Competence of Police Officers from the Tactical and Operative Response Unit by Ye. S. Romanenko

    Published 2021-07-01
    “…That’s why on purpose of providing civil security and law-and-order guard of the public events in 2017 the new unit of patrol police of tactical-operational respond TOR was organized. …”
    Get full text
    Article
  15. 6195

    Evaluation of vegetable pigeonpea [Cajanus cajan (L.) Millsp] genotypes for yield stability by J. D. Ojwang, R. Nyankanga, N. V. P. R. G. Ganga Rao, J. Imungi

    Published 2021-10-01
    “…Abstract Background Vegetable pigeonpea is an important food security crop in the marginal dry areas of the Eastern region of Kenya. …”
    Get full text
    Article
  16. 6196
  17. 6197

    Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB by Sabrina Adela Br Sibarani, Andreas Munthe, Ronsen Purba, Ali Akbar Lubis

    Published 2024-12-01
    “…The results indicate that the combination of DNA Cryptography, ACM, LM, and MLSB provides high security and is difficult to breach. …”
    Get full text
    Article
  18. 6198

    Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government. by Birungi, Edinah

    Published 2024
    “…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records, lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record keeping at RDLG were, provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
    Get full text
    Thesis
  19. 6199

    Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government. by Birungi, Edinah

    Published 2024
    “…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records. lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record-keeping at RDLG were the provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
    Get full text
    Thesis
  20. 6200

    Factors Associated with Stunting in Children Under Five Years of Age: A Case of Buhara Sub County, Kabale District. by Namanya, Oliver

    Published 2023
    “…The household financial security was seen to have influenced household food security, diversification, and supplementation. …”
    Get full text
    Thesis