Showing 981 - 1,000 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 981

    Research on the game of information security investment based on the Gordon-Loeb model by Qin WANG, Jianming ZHU

    Published 2018-02-01
    Subjects: “…information security investment…”
    Get full text
    Article
  2. 982

    A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices by Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. …”
    Get full text
    Article
  3. 983

    TVD‐PB logic circuit based on camouflaging circuit for IoT security by Yuejun Zhang, Qiufeng Wu, Pengjun Wang, Liang Wen, Zhicun Luan, Chongyan Gu

    Published 2022-01-01
    “…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
    Get full text
    Article
  4. 984
  5. 985
  6. 986
  7. 987

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
    Get full text
    Article
  8. 988
  9. 989

    A Secure RFID Authentication Protocol Adopting Error Correction Code by Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, Hung-Min Sun

    Published 2014-01-01
    “…RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. …”
    Get full text
    Article
  10. 990

    Research on industrial Internet security detection and response based on digital twin by MA Jiali, GUO Yuanbo, FANG Chen, CHEN Qingli, ZHANG Qi

    Published 2024-06-01
    “…Considering that traditional network security defense methods cannot meet the strict requirements of industrial Internet for reliability and stability, a method for anomaly detection and response in digital space was studied based on the idea of digital twins by collecting on-site data and using twin model security cognition. …”
    Get full text
    Article
  11. 991
  12. 992
  13. 993
  14. 994
  15. 995

    A data pipeline for secure extraction and sharing of social determinants of health. by Tyler Schappe, Lisa M McElroy, Moronke Ogundolie, Roland Matsouaka, Ursula Rogers, Nrupen A Bhavsar

    Published 2025-01-01
    “…<h4>Discussion and conclusion</h4>We describe a novel pipeline that can facilitate the secure acquisition and sharing of neighborhood-level SDOH without sharing PHI. …”
    Get full text
    Article
  16. 996

    THE NEXUS BETWEEN ARMED CONFLICT, SECURITY, PEACE EDUCATION AND DEVELOPMENT IN NIGERIA by SAMUEL BULUS WADZANI, OGUNDAIRO KAYODE EMMANUEL, AUGUSTINE ECHOBU OGWUCHE

    Published 2023-09-01
    “… This paper examines the interconnection between armed conflict, security, education, peace, and development in Nigeria. …”
    Get full text
    Article
  17. 997
  18. 998

    Constructing RBAC Based Security Model in u-Healthcare Service Platform by Moon Sun Shin, Heung Seok Jeon, Yong Wan Ju, Bum Ju Lee, Seon-Phil Jeong

    Published 2015-01-01
    “…In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. …”
    Get full text
    Article
  19. 999

    Provable security EPC information service communication scheme for EPC network by Jing-feng LI, Heng PAN, Wei-feng GUO

    Published 2013-08-01
    “…To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. …”
    Get full text
    Article
  20. 1000