Showing 1,581 - 1,600 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 1581
  2. 1582
  3. 1583

    A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility by Aviral Goel, Yogachandran Rahulamathavan

    Published 2024-12-01
    “…Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. …”
    Get full text
    Article
  4. 1584
  5. 1585
  6. 1586
  7. 1587

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
    Get full text
    Article
  8. 1588
  9. 1589

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…Security has become one of the important factors for any network communication and transmission of data packets. …”
    Get full text
    Article
  10. 1590

    Oral Health Status and Anxiety Level Amongst the Borderline Security Force Personnel and Their Family Members by Deepali Agarwal, Bharathi Purohit, Upendra Singh Bhadauria, Sneha Malhotra, Manali Deb Barma, Harsh Priya

    Published 2025-02-01
    “…The primary role of border security personnel is to safeguard borders against illegal trans-border activities during peacetime and provide military support during wartime. …”
    Get full text
    Article
  11. 1591

    Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture by Xuejiao LIU, Tiancong CAO, Yingjie XIA

    Published 2023-03-01
    “…To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was proposed.A blockchain was maintained by trusted authorities of different trust domains.A modified ciphertext-policy attribute-based encryption scheme was adopted to encrypt data, and encrypted data was stored in interplanetary file system (IPFS) with relevant information recorded on the blockchain, constructing a fine-grained and secure cross-domain data sharing scheme based on blockchain.A verification algorithm for cross-domain access based on the garbled Bloom filter was designed, and a smart contract executed fast decryption tests based on access policies on the blockchain, improving the access efficiency of a mass of ciphertext.A cross-domain data access method based on outsourcing decryption was designed, and the trusted authorities transformed ciphertexts while performing outsourcing decryption with complex bilinear pairing calculations, reducing the time overhead of vehicle decryption.Experiment results show that the proposed scheme is superior to other schemes in the process of cross-domain ciphertext transformation and vehicle decryption, and the cross-domain data access efficiency is increased by 60% on average.…”
    Get full text
    Article
  12. 1592
  13. 1593
  14. 1594

    The Relationship between Russian Identity and Political Polarization: The Role of Secure National Identification and National Narcissism by O.A. Gulevich, S.S. Kosimova

    Published 2025-01-01
    “…</strong>To analyse the relationship between secure national identification and national narcissism with political polarization (intergroup differentiation between people with different political views). …”
    Get full text
    Article
  15. 1595
  16. 1596
  17. 1597

    An Efficient and Hybrid Deep Learning-Driven Model to Enhance Security and Performance of Healthcare Internet of Things by Muhammad Babar, Muhammad Usman Tariq, Basit Qureshi, Zabeeh Ullah, Fahim Arif, Zahid Khan

    Published 2025-01-01
    “…However, H-IoT devices present security and Quality of Service (QoS) concerns because of their critical nature, complexity, and dynamic features, which make them incompatible with conventional network topologies. …”
    Get full text
    Article
  18. 1598

    Industrial Pipe-Rack Health Monitoring System Based on Reliable-Secure Wireless Sensor Network by Jong-Han Lee, Ji-Eun Jung, Nam-Gyu Kim, Byung-Hun Song

    Published 2012-10-01
    “…However, for the application of WSN technology in large-scale industrial plants, issues of reliability and security should be fully addressed, and an industrial sensor network standard that mitigatesthe problem of compatibilitywith legacy equipment and systems should be established. …”
    Get full text
    Article
  19. 1599
  20. 1600

    Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer by Hehao Niu, Bangning Zhang, Daoxing Guo, Mingyue Lu

    Published 2017-06-01
    “…In this article, we investigate the physical layer security problem in relay wireless sensor networks with simultaneous wireless information and power transfer. …”
    Get full text
    Article