Showing 321 - 340 results of 5,943 for search '"securities"', query time: 0.08s Refine Results
  1. 321

    The Security Needs of International Students: An Analysis in Terms of the Securitization Theory by Arda ÖZKAN, Gülşah TAŞÇI

    Published 2023-06-01
    “…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
    Get full text
    Article
  2. 322
  3. 323

    Load-Balanced Secure Routing Protocol for Wireless Sensor Networks by Wang Xin-sheng, Zhan Yong-zhao, Wang Liang-min

    Published 2013-06-01
    “…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
    Get full text
    Article
  4. 324
  5. 325
  6. 326

    A New Data Coding Algorithm for Secure Communication of Image by Hidayet Oğraş

    Published 2024-11-01
    “…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
    Get full text
    Article
  7. 327

    Formal Security in the Works of Legal Scholars of Pre-Soviet Period by E. E. Silantyeva

    Published 2021-07-01
    Subjects: “…formal security…”
    Get full text
    Article
  8. 328

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
    Get full text
    Article
  9. 329

    Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor by M. M. Panyuzheva

    Published 2019-12-01
    Subjects: “…euro-atlantic security system…”
    Get full text
    Article
  10. 330
  11. 331
  12. 332
  13. 333
  14. 334

    A Secure and Efficient White-Box Implementation of SM4 by Xiaobo Hu, Yanyan Yu, Yinzi Tu, Jing Wang, Shi Chen, Yuqi Bao, Tengyuan Zhang, Yaowen Xing, Shihui Zheng

    Published 2024-12-01
    “…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
    Get full text
    Article
  15. 335

    Changing role of security alliances in the post-Cold War era by I. A. Istomin, A. V. Levchenko

    Published 2024-07-01
    “…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
    Get full text
    Article
  16. 336

    Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications by Y. P. Makimaa, R. Sudarmani

    Published 2024-01-01
    “…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
    Get full text
    Article
  17. 337
  18. 338
  19. 339

    A Clonal Selection Optimization System for Multiparty Secure Computing by Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu, Xiang Wu

    Published 2021-01-01
    “…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
    Get full text
    Article
  20. 340

    MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY by N. Unizhayev

    Published 2016-03-01
    “…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
    Get full text
    Article