Showing 301 - 320 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 301
  2. 302
  3. 303
  4. 304
  5. 305

    Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2015-08-01
    “…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
    Get full text
    Article
  6. 306

    The Security of Student Information Management System Based upon Blockchain by Mingfeng Yang, Jianying Wang

    Published 2022-01-01
    “…This article aims to study the security of the student information management system based on the blockchain. …”
    Get full text
    Article
  7. 307
  8. 308
  9. 309
  10. 310

    Ritual as mechanism for securing life and averting evil among the Krobo by G. Ossom-Batsa

    Published 2008-06-01
    “…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
    Get full text
    Article
  11. 311

    Reputation-Based Secure Sensor Localization in Wireless Sensor Networks by Jingsha He, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, Wanqing Fu

    Published 2014-01-01
    “…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
    Get full text
    Article
  12. 312
  13. 313

    A secure method of voting and planning based on quadratic voting by Hamid Devisti, Massoud Hadian Dehkordi

    Published 2025-02-01
    “…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
    Get full text
    Article
  14. 314
  15. 315
  16. 316

    Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories by Buryk Myroslav M.

    Published 2024-06-01
    “…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
    Get full text
    Article
  17. 317
  18. 318
  19. 319
  20. 320

    Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks by Qiong Zhang

    Published 2016-07-01
    “…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
    Get full text
    Article