Showing 1,001 - 1,020 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1001

    Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks by Jun-Sub Kim, Jin Kwak

    Published 2014-04-01
    “…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. …”
    Get full text
    Article
  2. 1002

    The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking by Xingwang Wang

    Published 2017-01-01
    “…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. In this scenario, security and privacy have become the decisive factors. …”
    Get full text
    Article
  3. 1003
  4. 1004
  5. 1005
  6. 1006

    MECHANISMS FOR ENSURING SUSTAINABLE DEVELOPMENT AND FOOD SECURITY OF A SOVEREIGN COUNTRY by N. V. Mayorova, M. K. Mayorov, T. V. Bakhturazova, D. A. Edelev

    Published 2020-05-01
    “…The problems of food security and tasks aimed at preventing internal and external threats, sustainable development of domestic production sufficient to ensure food independence and state sovereignty have been considered.…”
    Get full text
    Article
  7. 1007

    Reconstructing a lightweight security protocol in the radio‐frequency identification systems by Alireza Abdellahi Khorasgani, Mahdi Sajadieh, Mohammad Rouhollah Yazdani

    Published 2023-07-01
    “…Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. …”
    Get full text
    Article
  8. 1008
  9. 1009

    ORGANIZATIONAL - METHODICAL FEATURES OF EVELUATING THE EFFECTIVENESS OF SUSTEMS ECONOMIC SECURITY THE FIRM by M. Vlasenko

    Published 2016-03-01
    “…The study revealed the main methods of ensuring the economic security of the organization, their characteristics and differences from other management techniques. …”
    Get full text
    Article
  10. 1010
  11. 1011
  12. 1012
  13. 1013
  14. 1014

    Fine-Grained Support of Security Services for Resource Constrained Internet of Things by Hyo Jin Ban, Jaeduck Choi, Namhi Kang

    Published 2016-05-01
    “…To improve such an issue, this paper proposes a secure but efficient scheme for resource constrained things. …”
    Get full text
    Article
  15. 1015

    Wireless Mesh network secure routing mechanism based on dynamic reputation by Hongyu YANG, Yue HAN

    Published 2019-04-01
    “…Aiming at the problem that the wireless Mesh network (WMN) security routing mechanism was scarce and internal malicious nodes drop data packets during data transmission,a secure routing mechanism based on dynamic reputation (SRMDR) for wireless Mesh network was proposed.Firstly,the dynamic reputation mechanism was used to evaluate the node’s behavior,the node’s comprehensive reputation value was calculated according to the node’s direct reputation value and the recommended reputation value,and the node’s dynamic reputation value was calculated according to the node’s historical comprehensive reputation value and the current comprehensive reputation value.Then,the dynamic reputation was combined with the routing mechanism to establish secure routing paths,the nodes with a dynamic reputation value less than the threshold were determined to be malicious nodes,which were isolated during the routing process.Experimental results show that compared with HWMP and SHaRP,SRMDR has higher malicious node recognition rates,and SRMDR can effectively reduce packet loss rate and improve network throughput.…”
    Get full text
    Article
  16. 1016
  17. 1017
  18. 1018

    Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility by Thomas W. Dean

    Published 2004-10-01
    “… This document identifies and discusses three key features of a pesticide storage facility's interior that, in combination, promote both worker safety and pesticide container security. This document is Fact Sheet PI-31, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  19. 1019

    Efficient secure federated learning aggregation framework based on homomorphic encryption by Shengxing YU, Zhong CHEN

    Published 2023-01-01
    “…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
    Get full text
    Article
  20. 1020

    Security Analysis of Image Scrambling Cipher Based on Compound Chaotic Equation by Luoyin Feng

    Published 2021-01-01
    “…As digital image has become one of the most important forms of expression in multimedia information, the security of digital image has become a concern. Because of its large amount of data and high redundancy, there are many security hidden dangers in ordinary image encryption methods. …”
    Get full text
    Article