Showing 1,501 - 1,520 results of 9,720 for search '"Securities ', query time: 0.12s Refine Results
  1. 1501
  2. 1502
  3. 1503

    SAFETY AND SECURITY OF WOMEN ON TRANSPORT: A CASE OF RIDE-HAILING SERVICES IN GAUTENG, SOUTH AFRICA by Babra DURI

    Published 2023-12-01
    “…This study explores the safety and security of women using ride-hailing services in Gauteng. …”
    Get full text
    Article
  4. 1504

    Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks by YoHan Park, SungYup Lee, ChangKyun Kim, YoungHo Park

    Published 2016-07-01
    “…To overcome these drawbacks, we propose a secure biometric-based authentication scheme in WSNs that is secure against inside adversaries and provides secure and efficient smart card revocation/reissue.…”
    Get full text
    Article
  5. 1505
  6. 1506

    Synthesizing the impact of armed conflicts on food security, livelihoods and social dynamics in Amhara region, Ethiopia by Jemal Hassen Muhyie, Desalegn Yayeh, Seblewongiel Ayenalem Kidanie, Wubshet Asnake Metekia, Temesgen Tilahun

    Published 2025-02-01
    “…This resulted in severe damage to the food security, livelihoods and social dynamics of communities in the Amhara region. …”
    Get full text
    Article
  7. 1507
  8. 1508

    A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks by Ramesh Sekaran, Ganesh Kumar Parasuraman

    Published 2014-01-01
    “…The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. …”
    Get full text
    Article
  9. 1509
  10. 1510
  11. 1511

    The evolution of food security in Japan-Based on an indicator evaluation system including climate change indicators. by Caixia Li

    Published 2025-01-01
    “…As climate change intensifies, food security has received widespread attention. This study examines the development of Japan's food security index and its relationship with climate change. …”
    Get full text
    Article
  12. 1512
  13. 1513
  14. 1514

    Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps by Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu

    Published 2019-04-01
    “…Thus, the proposed scheme is more desirable for securing communication in mobile networks.…”
    Get full text
    Article
  15. 1515

    RNA Biopesticides: A Cutting‐Edge Approach to Combatting Aquaculture Diseases and Ensuring Food Security by Qiu Li, Lixing Huang

    Published 2024-12-01
    “…With high specificity and minimal environmental impact, RNA biopesticides provide an innovative, sustainable approach to combating diseases in aquaculture, enhancing both food security and environmental safety.…”
    Get full text
    Article
  16. 1516
  17. 1517
  18. 1518

    On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys by Junghyun Nam, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, Dongho Won

    Published 2014-01-01
    “…Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. …”
    Get full text
    Article
  19. 1519
  20. 1520