Showing 1,261 - 1,280 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1261
  2. 1262
  3. 1263

    Eucalyptus-based livelihoods: enhancing household food security and resilience in Northwest Ethiopia by Fasika Belay, Fasika Belay, Messay Mulugeta, Teferee Makonnen

    Published 2025-02-01
    “…Farmers in northwest Ethiopia have been transforming their livelihood strategies, however, the impact of this transformation on food security status and resilience is hardly investigated. …”
    Get full text
    Article
  4. 1264

    Monitoring Brazilian Food Security Based on Emergy Concepts: A Proposed Approach by Rafael Araujo Nacimento, Mario Duarte Canever, Luiz Carlos Terra dos Santos, Cecília Almeida, Feni Agostinho, Biagio Fernando Giannetti

    Published 2024-12-01
    “…This study enhances the discussion on food security by examining trade equity between food consumers and the supply chain from an emergy perspective. …”
    Get full text
    Article
  5. 1265

    Secure privacy-preserving record linkage system from re-identification attack. by Sejong Lee, Yushin Kim, Yongseok Kwon, Sunghyun Cho

    Published 2025-01-01
    “…Our method's efficacy was validated through simulations on the Titanic and North Carolina Voter Records (NCVR) datasets, demonstrating a substantial reduction in re-identification rates. Security analysis confirms that our zero-relationship encoding effectively preserves privacy against graph-based re-identification threats, improving PPRL technology's security.…”
    Get full text
    Article
  6. 1266
  7. 1267
  8. 1268
  9. 1269

    Production of Rice in Nigeria: The Role of Indian-Nigerian Bilateral Cooperation in Food Security by I. U. Lucky

    Published 2020-07-01
    “…The paper concludes that the agreements, particularly the one of 2017, have further promoted, strengthened and expanded rice production in the context of food security, job creation and saving foreign exchange. …”
    Get full text
    Article
  10. 1270
  11. 1271

    Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors by J. Portilla, A. Otero, E. de la Torre, T. Riesgo, O. Stecklina, S. Peter, P. Langendörfer

    Published 2010-10-01
    “…Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. …”
    Get full text
    Article
  12. 1272
  13. 1273
  14. 1274
  15. 1275
  16. 1276
  17. 1277
  18. 1278

    Secure efficient and verifiable large linear equations solve outsourcing computing scheme by Xing-lan ZHANG, Xiang LIU

    Published 2017-06-01
    “…A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in outsourcing computation.A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations.It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method.It also improves the verification effciency and reduces the complexity of space.The performance analysis shows that the scheme is highly efficient.…”
    Get full text
    Article
  19. 1279

    Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security by Shaomin Zhu, Zhiqiang Zhang

    Published 2013-11-01
    “…Therefore, how to realize digital media security effectively is becoming a challenging problem. …”
    Get full text
    Article
  20. 1280

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article