Showing 661 - 680 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 661

    A secure method of voting and planning based on quadratic voting by Hamid Devisti, Massoud Hadian Dehkordi

    Published 2025-02-01
    “…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
    Get full text
    Article
  2. 662
  3. 663
  4. 664
  5. 665
  6. 666

    Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories by Buryk Myroslav M.

    Published 2024-06-01
    “…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
    Get full text
    Article
  7. 667
  8. 668
  9. 669
  10. 670
  11. 671
  12. 672

    Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3

    Published 2010-01-01
    “…The proposed scheme satisfies security properties: correctness and partial blindness. …”
    Get full text
    Article
  13. 673

    Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks by Qiong Zhang

    Published 2016-07-01
    “…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
    Get full text
    Article
  14. 674

    The Security Needs of International Students: An Analysis in Terms of the Securitization Theory by Arda ÖZKAN, Gülşah TAŞÇI

    Published 2023-06-01
    “…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
    Get full text
    Article
  15. 675
  16. 676
  17. 677
  18. 678

    Load-Balanced Secure Routing Protocol for Wireless Sensor Networks by Wang Xin-sheng, Zhan Yong-zhao, Wang Liang-min

    Published 2013-06-01
    “…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
    Get full text
    Article
  19. 679
  20. 680