Showing 1,341 - 1,360 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1341
  2. 1342
  3. 1343
  4. 1344

    Water management for rice production: a key component of food security in East Africa by Denis Bwire, Hirotaka Saito, Roy C. Sidle, Moses Mugisha

    Published 2025-02-01
    “…Abstract Water is a valuable resource for rice production, which is an integral component of food security in East Africa (EA). Rice farming is expanding in the region, with up to 90% produced on smallholder farms using traditional flooding and rain-fed methods, vulnerable to climate change and variability. …”
    Get full text
    Article
  5. 1345
  6. 1346

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
    Get full text
    Article
  7. 1347

    Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment by Yuan Gao, Hequn Xian, Aimin Yu

    Published 2020-03-01
    “…In order to ensure data security for deduplication, different data should be assigned with different privacy levels. …”
    Get full text
    Article
  8. 1348
  9. 1349
  10. 1350

    Concepts and types of administrative and legal means of ensuring economic security by the National Police of Ukraine by V. V. Tolochko

    Published 2018-12-01
    “…The conducted research should become the basis for studying the problems of certain administrative and legal means of ensuring economic security by the National Police of Ukraine, which is a perspective direction for further scientific research.…”
    Get full text
    Article
  11. 1351
  12. 1352
  13. 1353

    Wireless body area network: Architecture and security mechanism for healthcare using internet of things by Arun Kumar, Ritu Dewan, Wisam Subhi Al-Dayyeni, Bharat Bhushan, Jayant Giri, Sardar MN Islam, Ahmed Elaraby

    Published 2025-01-01
    “…The data generated by small sensor devices need strong security methods for secure transmission over a public network. …”
    Get full text
    Article
  14. 1354

    Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks by B. Madhusudhanan, S. Chitra, C. Rajan

    Published 2015-01-01
    “…In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. …”
    Get full text
    Article
  15. 1355
  16. 1356
  17. 1357
  18. 1358

    Unified operation monitoring and security warning platform based on big data in energy group by Jing WANG, Kunlun GAO, Chaoyi BIAN, Xiao LIANG

    Published 2018-05-01
    “…With the increasing of information assets of energy group,in order to effectively cope with information security risks,using the big data and the intersecting confirmation mechanics of multi-source data,a monitoring and security warning platform was designed for information devices and application systems in energy group.By the global analysis of big multi-source data,the real-time awareness of risk and situation could be achieved,which was valuable for the progress of operation and management level of information system and timely warning of the spread of information risk to the power system.…”
    Get full text
    Article
  19. 1359
  20. 1360

    A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security by Shaohui Wang, Danwei Chen, Zhiwei Wang, Suqin Chang

    Published 2012-09-01
    “…In this paper, after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme, we present an efficient public auditing scheme with privacy property. The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.…”
    Get full text
    Article