Showing 121 - 140 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 121

    Survey on network security based on blockchain by Ye CHEN, Dongjin XU, Liang XIAO

    Published 2018-03-01
    Subjects: “…network security…”
    Get full text
    Article
  2. 122
  3. 123
  4. 124
  5. 125
  6. 126

    Virtualization security:the good,the bad and the ugly by Yu-tao LIU, Hai-bo CHEN

    Published 2016-10-01
    Subjects: “…virtualization security…”
    Get full text
    Article
  7. 127

    Right of Access to Information and Media Security by V. P. Kirilenko, G. V. Alekseev

    Published 2019-10-01
    “…With the development of virtual law institutions, the priority of media security is to preserve the superiority of creative works created by man over the results of computer processing of information. …”
    Get full text
    Article
  8. 128

    Wireless secure enhancement with cooperative jamming by Li-juan ZHANG, Zhi-hong LIU, Hong-bo ZHANG, Yong ZENG, Jian-feng MA

    Published 2017-02-01
    “…Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.…”
    Get full text
    Article
  9. 129

    Secure Pesticide Storage: General Features by Frederick M. Fishel

    Published 2009-12-01
    “…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  10. 130
  11. 131

    Secure Pesticide Storage: General Features by Frederick M. Fishel

    Published 2009-12-01
    “…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  12. 132
  13. 133

    Discussion on the cultivation of cyber security talents by Jian WENG, Linfeng WEI, Yue ZHANG

    Published 2019-06-01
    Subjects: “…cyber security…”
    Get full text
    Article
  14. 134
  15. 135

    Issues and challenges of Internet DNS security by Ning HU, Wen-ping DENG, Su YAO

    Published 2017-03-01
    Subjects: “…DNS security…”
    Get full text
    Article
  16. 136
  17. 137
  18. 138
  19. 139

    Discussions on the talent cultivation of cyber security by Jian WENG, Chang-she MA, Liang GU

    Published 2016-02-01
    Subjects: “…cyber security…”
    Get full text
    Article
  20. 140