Showing 641 - 660 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 641
  2. 642
  3. 643
  4. 644
  5. 645

    Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2015-08-01
    “…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
    Get full text
    Article
  6. 646

    The Security of Student Information Management System Based upon Blockchain by Mingfeng Yang, Jianying Wang

    Published 2022-01-01
    “…This article aims to study the security of the student information management system based on the blockchain. …”
    Get full text
    Article
  7. 647
  8. 648
  9. 649
  10. 650

    Ritual as mechanism for securing life and averting evil among the Krobo by G. Ossom-Batsa

    Published 2008-06-01
    “…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
    Get full text
    Article
  11. 651
  12. 652
  13. 653
  14. 654

    Provable secure mutual authentication protocol for RFID in the standard model by Feng XIAO, Ya-jian, ZHOU, Jing-xian ZHOU, Xin-xin NIU

    Published 2013-04-01
    “…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
    Get full text
    Article
  15. 655
  16. 656

    Reputation-Based Secure Sensor Localization in Wireless Sensor Networks by Jingsha He, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, Wanqing Fu

    Published 2014-01-01
    “…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
    Get full text
    Article
  17. 657
  18. 658
  19. 659
  20. 660