Showing 1,601 - 1,620 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 1601

    Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid by Sergio Saponara, Tony Bacchillone

    Published 2012-01-01
    “…This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. …”
    Get full text
    Article
  2. 1602
  3. 1603

    INFLUENCE OF SECURITY CHALLENGES ON STUDENT ACADEMIC PERFORMANCE IN COLLEGE OF EDUCATION BILLIRI, GOMBE STATE, NIGERIA by MOHAMMED ABUBAKAR SABO, YAKUBU MUHAMMAD BELLO, MUHAMMAD AUWAL

    Published 2024-06-01
    “…The major recommendations by the researchers are the management of the college are to invest in advanced and reliable security equipment, ensure the presence of adequately trained security personnel and implement comprehensive and effective security policies and procedures and establish counseling and psychological support services to help students manage stress and anxiety related to insecurity. …”
    Get full text
    Article
  4. 1604
  5. 1605

    Determinants of Rural Household Food Security Status in North Shewa Zone, Amhara Region, Ethiopia by Abebaw Hailu Fikire, Mesele Belay Zegeye

    Published 2022-01-01
    “…This paper used the calorie intake method per day to measure household food security status and a logit model to investigate the determinants of food security. …”
    Get full text
    Article
  6. 1606

    A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things by Yong Shen, Xiaokang Tang, Xiang Zhang, Yongzhuang Zhou, Hongxin Zou

    Published 2022-11-01
    “…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. …”
    Get full text
    Article
  7. 1607
  8. 1608
  9. 1609
  10. 1610
  11. 1611
  12. 1612
  13. 1613
  14. 1614
  15. 1615
  16. 1616
  17. 1617

    Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols by Ang Yang, Junghyun Nam, Moonseong Kim, Kim-Kwang Raymond Choo

    Published 2014-01-01
    “…Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. …”
    Get full text
    Article
  18. 1618
  19. 1619
  20. 1620