Showing 81 - 100 results of 9,720 for search '"Securities ', query time: 0.05s Refine Results
  1. 81
  2. 82

    Security Requirements for Multimedia Archives by Sang Bae Park

    Published 2015-01-01
    “…This longevity of contents causes new security issues that threat the archive systems. In this paper, we discuss these new security issues in perspective. …”
    Get full text
    Article
  3. 83
  4. 84

    Research on Java card security by Xue-lian ZHANG, Zhen WU, Zhi-bo DU, Min WANG, Chun-ling XIANG

    Published 2017-06-01
    “…To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault injection and combined attack.At the same time,some problems with the attack process were presented.Moreover,some corresponding countermeasures were put forward and their shortages were analyzed.Finally,the future research direction was prospected.…”
    Get full text
    Article
  5. 85

    Security Vision of 5G by Hongru Zhu, Xiaojun Zhuang, Shu Guo, Minpeng Qi

    Published 2014-11-01
    Subjects: “…5G security…”
    Get full text
    Article
  6. 86

    The Issue of Food Security in Cuba by José Alvarez

    Published 2004-09-01
    “…FE483/FE483: The Issue of Food Security in Cuba (ufl.edu) …”
    Get full text
    Article
  7. 87
  8. 88

    The Issue of Food Security in Cuba by José Alvarez

    Published 2004-09-01
    “…FE483/FE483: The Issue of Food Security in Cuba (ufl.edu) …”
    Get full text
    Article
  9. 89

    Security in cognitive radio networks by Qing-qi PEI, Hong-ning LI, Hong-yang ZHAO, Nan LI, Ying MIN

    Published 2013-01-01
    “…Cognitive radio can obtain and access spectrum white holes without interfering primary users by sensing wireless environment to meet with the more spectrum requirement of users and improve spectrum utilization.However,it also brings new secure challenges that different from traditional wireless networks.Relying cognition cycle,the security issues in cognitive radio networks are presented from data channel,control channel and terminal equipment,then the existing defensive measures and propose the secure recommendations of cognitive radio networks are introduced.…”
    Get full text
    Article
  10. 90
  11. 91

    THE MONITORING OF ECONOMIC SECURITY OF THE ORGANIZATION by V. Lokhanova

    Published 2016-02-01
    “…In the article the concept of monitoring of economic security of the organization is defined from the point of view of its relevance and functionality. …”
    Get full text
    Article
  12. 92
  13. 93
  14. 94

    Defining Community Food Security by Alison E. Lutz, Mickie E. Swisher, Mark A. Brennan

    Published 2007-07-01
    “…AEC 383/WC064: Defining Community Food Security (ufl.edu) …”
    Get full text
    Article
  15. 95

    On the Security of Certificateless Signature Schemes by Gaurav Sharma, Suman Bala, Anil K. Verma

    Published 2013-06-01
    “…CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. …”
    Get full text
    Article
  16. 96
  17. 97
  18. 98
  19. 99

    Defining Community Food Security by Alison E. Lutz, Mickie E. Swisher, Mark A. Brennan

    Published 2007-07-01
    “…AEC 383/WC064: Defining Community Food Security (ufl.edu) …”
    Get full text
    Article
  20. 100