Showing 441 - 460 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 441
  2. 442
  3. 443
  4. 444
  5. 445

    Privacy and Security in Digital Health Contact-Tracing: A Narrative Review by Shehani Pigera, Paul van Schaik, Karen Renaud, Miglena Campbell, Petra Manley, Pierre Esser

    Published 2025-01-01
    “…Such acceptance depends on public perceptions and are likely influenced by privacy and security concerns. Therefore, this review evaluates public perceptions towards the privacy and security of contact-tracing apps used during the recent COVID-19 pandemic, with a focus on identifying factors that influence acceptance. (2) Methods: A systematic literature review was performed. …”
    Get full text
    Article
  6. 446

    Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication by Hazem Ismail Ali, Harrison Kurunathan, Mohamed Hamdy Eldefrawy, Flavius Gruian, Magnus Jonsson

    Published 2025-01-01
    “…We also highlight the fast lightweight security protocols implemented on heterogeneous embedded, low-power, high-performance computing platforms as a viable solution to address these challenges.…”
    Get full text
    Article
  7. 447

    Juridical construction of socio-ecological security: Indonesia’s vulnerability to climate change by Atika Sari Diah Apriani, Triatmodjo Marsudi, Purwanto Harry

    Published 2025-01-01
    “…This research is a normative study that examines the legal framework of socio-ecological security concerning Indonesia’s vulnerability as an archipelagic nation due to the impacts of climate change. …”
    Get full text
    Article
  8. 448

    Analysis of Russian Federation Foreign Policy in the Field of International Information Security by E. S. Zinovieva

    Published 2014-12-01
    Subjects: “…international information security…”
    Get full text
    Article
  9. 449

    Producing secure multimodal biometric descriptors using artificial neural networks by Dogu Cagdas Atilla, Raghad Saeed Hasan Alzuhairi, Cagatay Aydin

    Published 2021-03-01
    “…Abstract With the rapidly growing use of biometric authentication systems, the security of these systems and the privacy of users have attracted significant attention in recent years. …”
    Get full text
    Article
  10. 450
  11. 451
  12. 452

    Digital economic security of Russian organizations, industries and Russia as a whole by S. A. Antonov, A. V. Savchenko, O. G. Kazeeva

    Published 2019-09-01
    Subjects: “…digital economic security of the organization…”
    Get full text
    Article
  13. 453
  14. 454
  15. 455

    Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection by Yu’e Jiang, Jiaxiang Liu

    Published 2017-01-01
    “…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
    Get full text
    Article
  16. 456

    Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results by S. Krut, Ch. Azevedo Coste, P. Chabloz

    Published 2011-01-01
    “…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
    Get full text
    Article
  17. 457
  18. 458
  19. 459

    Access to Network Login by Three-Factor Authentication for Effective Information Security by S. Vaithyasubramanian, A. Christy, D. Saravanan

    Published 2016-01-01
    “…In this way managing additional secret key includes an additional layer of security.…”
    Get full text
    Article
  20. 460