Showing 461 - 480 results of 5,943 for search '"securities"', query time: 0.05s Refine Results
  1. 461

    An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment by Vinothkumar Muthurajan, Balaji Narayanasamy

    Published 2016-01-01
    “…Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. …”
    Get full text
    Article
  2. 462
  3. 463

    A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects by Hui He, Dongyan Zhang, Min Liu, Weizhe Zhang, Dongmin Gao

    Published 2014-01-01
    “…Software security defects have a serious impact on the software quality and reliability. …”
    Get full text
    Article
  4. 464
  5. 465
  6. 466

    A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices by Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. …”
    Get full text
    Article
  7. 467

    TVD‐PB logic circuit based on camouflaging circuit for IoT security by Yuejun Zhang, Qiufeng Wu, Pengjun Wang, Liang Wen, Zhicun Luan, Chongyan Gu

    Published 2022-01-01
    “…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
    Get full text
    Article
  8. 468
  9. 469
  10. 470

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
    Get full text
    Article
  11. 471

    A Secure RFID Authentication Protocol Adopting Error Correction Code by Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, Hung-Min Sun

    Published 2014-01-01
    “…RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. …”
    Get full text
    Article
  12. 472
  13. 473

    A data pipeline for secure extraction and sharing of social determinants of health. by Tyler Schappe, Lisa M McElroy, Moronke Ogundolie, Roland Matsouaka, Ursula Rogers, Nrupen A Bhavsar

    Published 2025-01-01
    “…<h4>Discussion and conclusion</h4>We describe a novel pipeline that can facilitate the secure acquisition and sharing of neighborhood-level SDOH without sharing PHI. …”
    Get full text
    Article
  14. 474

    THE NEXUS BETWEEN ARMED CONFLICT, SECURITY, PEACE EDUCATION AND DEVELOPMENT IN NIGERIA by SAMUEL BULUS WADZANI, OGUNDAIRO KAYODE EMMANUEL, AUGUSTINE ECHOBU OGWUCHE

    Published 2023-09-01
    “… This paper examines the interconnection between armed conflict, security, education, peace, and development in Nigeria. …”
    Get full text
    Article
  15. 475
  16. 476

    Constructing RBAC Based Security Model in u-Healthcare Service Platform by Moon Sun Shin, Heung Seok Jeon, Yong Wan Ju, Bum Ju Lee, Seon-Phil Jeong

    Published 2015-01-01
    “…In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. …”
    Get full text
    Article
  17. 477

    Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks by Jun-Sub Kim, Jin Kwak

    Published 2014-04-01
    “…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. …”
    Get full text
    Article
  18. 478

    The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking by Xingwang Wang

    Published 2017-01-01
    “…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. In this scenario, security and privacy have become the decisive factors. …”
    Get full text
    Article
  19. 479
  20. 480

    MECHANISMS FOR ENSURING SUSTAINABLE DEVELOPMENT AND FOOD SECURITY OF A SOVEREIGN COUNTRY by N. V. Mayorova, M. K. Mayorov, T. V. Bakhturazova, D. A. Edelev

    Published 2020-05-01
    “…The problems of food security and tasks aimed at preventing internal and external threats, sustainable development of domestic production sufficient to ensure food independence and state sovereignty have been considered.…”
    Get full text
    Article