Showing 1,981 - 2,000 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 1981

    Legal bases of material support of militia workers of the Ukrainian SSR in the 20s of the XX century by S. V. Vasyliev

    Published 2021-12-01
    “…The legal acts of the Ukrainian SSR, which established the conditions and amounts of social security and remuneration of militia workers, were studied. …”
    Get full text
    Article
  2. 1982

    Locarno Treaties (1925) in the Context of the Versailles System Transformation as seen from London by E. V. Khakhalkina, V. S. Dzyuba

    Published 2021-04-01
    “…It allows the authors to trace the evolution of approaches by the main British political parties to security issues in Europe. A systematic comparison of views of the Conservative and the Labour party representatives on the Geneva Protocol and the Rhineland Pact shows that by mid-1920s the British political elites advocated for an in-depth transformation of the Versailles order, particularly, through the development of an effective mechanism for maintaining international security. …”
    Get full text
    Article
  3. 1983

    Machine Learning-Integrated Usability Evaluation and Monitoring of Human Activities for Individuals With Special Needs During Hajj and Umrah by Ghadah Naif Alwakid

    Published 2025-01-01
    “…These acts of worship are still very challenging for the mobility, security, and accessibility of people with special needs. …”
    Get full text
    Article
  4. 1984
  5. 1985
  6. 1986

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…Without security, the message is often utilized by an irresponsible person. …”
    Get full text
    Article
  7. 1987
  8. 1988
  9. 1989
  10. 1990
  11. 1991

    Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network by Yang Wu, Yongmei Sun, Lei Zhan, Yuefeng Ji

    Published 2013-06-01
    “…The services in BAN usually have a high requirement on security, especially for the medical diagnosis, which involves private information. …”
    Get full text
    Article
  12. 1992

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…As a result, information security has become even more critical than before. …”
    Get full text
    Article
  13. 1993
  14. 1994

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. …”
    Get full text
    Article
  15. 1995
  16. 1996

    Fuzzy-Based Trust Prediction Model for Routing in WSNs by X. Anita, M. A. Bhagyaveni, J. Martin Leo Manickam

    Published 2014-01-01
    “…The sensitive application environments and resource constraints of WSNs mandate the requirement of lightweight security scheme. The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nodes in the network. …”
    Get full text
    Article
  17. 1997

    Hybrid Cryptography Based on Planets: Phobos & Deimos by Kraicha Ayoub, Touil Hamza, El Akkad Nabil

    Published 2025-01-01
    “…Remote access has become essential for business continuity but also introduces significant security risks. To address these issues, it is crucial to innovate in cryptography, the backbone of data security. …”
    Get full text
    Article
  18. 1998
  19. 1999

    Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation by Musheer Ahmad, Eesa Al-Solami

    Published 2020-01-01
    “…The standard set of performance parameters such as nonlinearity, strict avalanche criterion, bits independent criterion, differential uniformity, and linear approximation probability is quantified to assess the security and robustness of proposed S-box. The simulation and comparison results demonstrate the effectiveness of proposed method for the construction of cryptographically sound S-boxes.…”
    Get full text
    Article
  20. 2000