Showing 2,041 - 2,060 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 2041
  2. 2042
  3. 2043

    A New Image Encryption Method Using an Optimized Smart Codebook by Rami Sihwail, Dyala Ibrahim

    Published 2025-01-01
    “…The assessment of the proposed encryption method demonstrates its resilience against cryptographic attacks, affirming its security and precision. The results show an impressive improvement in securing images compared to previous related efforts.…”
    Get full text
    Article
  4. 2044

    Regulatory and policy analysis of employment and health protections in Indonesia’s creative economy by Afrilies Marlia Hafny, Naili Yuris Tri, Lina Angie Angel

    Published 2025-01-01
    “…Using a normative legal research method, this study analyzes key legal frameworks, including laws related to manpower, social security, and creative economy regulations, to assess the extent to which existing policies address labor and health protection in the digital era. …”
    Get full text
    Article
  5. 2045

    Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks by Walter Tiberti, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci

    Published 2020-10-01
    “…This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. …”
    Get full text
    Article
  6. 2046

    A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching by Zhigang Chen, Jian Wang, Liqun Chen, Xinxia Song

    Published 2014-01-01
    “…We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level.…”
    Get full text
    Article
  7. 2047

    EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM by T Devapriya, V Ganesan, S Velmurugan

    Published 2024-12-01
    “…The objective is to provide a dependable, scalable, and energy-efficient solution for WSN security. This will ensure that data remains intact and that rogue nodes cannot disrupt the network. …”
    Get full text
    Article
  8. 2048

    Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment by Sang-Soo Yeo, Dae-il Park, Young-Ae Jung

    Published 2014-01-01
    “…This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. …”
    Get full text
    Article
  9. 2049

    THE MENACE OF BANDITRY AND KIDNAPPING IN NIGERIA: AN ASSESSMENT OF SHEIKH GUMI'S MEDIATORY ROLE IN THE RELEASE OF GREENFIELD UNIVERSITY KIDNAPPED STUDENTS by SOLOMON AYANTAYO OJO, OLUSEGUN STEVE ADEGOKE

    Published 2025-01-01
    “… The increase in banditry and kidnapping in Nigeria has created significant security challenges in recent years, particularly with attacks on educational institutions where students are abducted for ransom. …”
    Get full text
    Article
  10. 2050
  11. 2051

    Energy Price Crisis and War Sanctions — Tomorrow’s Energy Supply by Ueberblick

    Published 2022-04-01
    “…What challenges does German policy now face and what measures should it take in order not to jeopardise security of supply, price stability and the “Energiewende”? …”
    Get full text
    Article
  12. 2052
  13. 2053
  14. 2054

    PREVALENCE AND CONSEQUENCES OF KIDNAPPING IN SOUTHERN TARABA STATE, NIGERIA by YIKWABS PETER YIKWAB, WAJIM JOHN, ALEGBEJO NOAH KOLAWOLE, AROKOYO JACOB

    Published 2021-05-01
    “… Kidnapping is one of the security challenges Nigeria is faced with and Taraba State is not an exception. …”
    Get full text
    Article
  15. 2055

    A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices by Sanaz Kavianpour, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, Friso De Boer

    Published 2019-01-01
    “…The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. …”
    Get full text
    Article
  16. 2056
  17. 2057
  18. 2058

    Basic principles of Russian foreign policy under Vladimir Putin by Sadeghi Elham Mir Mohammad, Ahmad Vakhshitekh

    Published 2020-12-01
    “…The article notes the multi-vector nature of Russia's foreign policy strategy aimed at developing multilateral interstate relations, achieving peace and security in the interstate arena, actively countering modern challenges and threats to interstate security, as well as the formation of a multipolar world. …”
    Get full text
    Article
  19. 2059
  20. 2060

    Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations by Xinsheng Li, Zhilong Xie, Jiang Wu, Taiyong Li

    Published 2019-01-01
    “…And hence how to enhance the security of images has become a hot topic in the field of information security. …”
    Get full text
    Article