Showing 101 - 120 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104
  5. 105

    An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks by Min Wei, Keecheon Kim

    Published 2016-11-01
    “…In this study, a security testing method based on security levels is proposed for wireless sensor networks. …”
    Get full text
    Article
  6. 106
  7. 107
  8. 108

    On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks by Jun He, Zheng Yang, Jianxun Zhang, Wanping Liu, Chao Liu

    Published 2018-01-01
    “…However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem.…”
    Get full text
    Article
  9. 109

    Perancangan Spesifikasi Keamanan untuk Pengembangan Aplikasi Secure Chat Berdasarkan Common Criteria For It Security Evaluation by Amiruddin Amiruddin, Muhammad Faqih Rohmani

    Published 2021-11-01
    “…This means that security features in some chat applications are developed not based on security specification designs. …”
    Get full text
    Article
  10. 110
  11. 111

    Household water security is a mediator of household food security in a nationally representative sample of Mexico by Teresa Shamah-Levy, Ignacio Méndez-Gómez-Humarán, Verónica Mundo-Rosas, Alicia Muñoz-Espinosa, Hugo Melgar-Quiñonez, Sera Lewise Young

    Published 2025-01-01
    “… Abstract Objective: Explore the relationship between water insecurity (WI) and food security and their covariates in Mexican households. …”
    Get full text
    Article
  12. 112
  13. 113

    Water Diplomacy and Non-Traditional Security by Krisman Heriamsal, Rivelda Pricilia Heatubun, Heyna Jekaisa, Andi Ira Tenri Adikusuma

    Published 2025-01-01
    “… The water scarcity crisis in Iraq has become a non-traditional security issue that threatens the country's social, political and economic stability. …”
    Get full text
    Article
  14. 114
  15. 115

    Security of the cryptosystems based on ergodic matrices by Hua-wei HUANG, Chang-wen PENG, Yun-yun QU, Chun-hua LI

    Published 2015-08-01
    “…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
    Get full text
    Article
  16. 116
  17. 117

    Research on the Solution of Business Platform Security by Yanchun Wang, Hong Li

    Published 2013-08-01
    Subjects: “…business platform security…”
    Get full text
    Article
  18. 118
  19. 119
  20. 120

    Emerging international regime of information security by S. V. Shitkov, T. A. Polyakova, A. A. Smirnov

    Published 2021-11-01
    Subjects: “…international information security…”
    Get full text
    Article