Showing 2,081 - 2,100 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 2081

    Pediatric Emergency Department-based Food Insecurity Screening During the COVID-19 Pandemic by Stephanie Ruest, Lana Nguyen, Celeste Corcoran, Susan Duffy

    Published 2024-11-01
    “…Six validated US Department of Agriculture household food security questions and sociodemographic questions were included. …”
    Get full text
    Article
  2. 2082
  3. 2083

    Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora by Ari Kusyanti, I Putu Agrahita Wiguna, Fariz Andri Bakhtiar

    Published 2023-12-01
    “…Data security can be done with hashing algorithms such as SPONGENT algorithm. …”
    Get full text
    Article
  4. 2084
  5. 2085

    Strategic Planning of Public Spaces in Order to Promote and Benefit from Social Interactions, Case Study: District 10 of Tehran Municipality by samaneh jalilisadrabad, somayeh jalilisadrabad

    Published 2025-03-01
    “…Furthermore, issues such as physical deterioration, disrupted urban landscapes, a high tenant rate, low social security, and a transient population have further diminished the quality of existing public spaces and the level of social interaction in this particular district. …”
    Get full text
    Article
  6. 2086

    Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish by Nuniek Fahriani, Harunur Rosyid

    Published 2019-12-01
    “…To perform the function of the video file data security system, the legality of access to data is very important to secure so that it does not result in misuse of data access rights. …”
    Get full text
    Article
  7. 2087
  8. 2088

    Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal by Lina Sofía Cardona Martínez, Cesar Andrés Sandoval Muñoz, Ricardo Salazar-Cabrera, Álvaro Pachón de la Cruz, Juan Manuel Madrid Molina

    Published 2025-01-01
    “…This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. …”
    Get full text
    Article
  9. 2089

    On the Front Lines: Helping Military Spouses Thrive in Your Community by Kristen Jowers, Martie Gillen

    Published 2024-01-01
    “…This publication discusses military spouse demographics, military spouse employment, military spouse well-being including food security, financial security, and civilian community belonging, and employment resources and strategies to support military spouses. …”
    Get full text
    Article
  10. 2090

    Spousal Individual Retirement Accounts by Lisa Leslie

    Published 2014-11-01
    “… A spouse who stays at home to take care of children or other dependents is likely to have reduced Social Security benefits and will not have access to a workplace retirement plan. …”
    Get full text
    Article
  11. 2091

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…Then a new certificateless aggregate signature scheme with constant pairing computations based on the new certificateless signature scheme is presented. Security analysis shows that the proposed certificateless aggregate signature scheme is provably secured in the random oracle.…”
    Get full text
    Article
  12. 2092

    BANDITRY AND GENDER-BASED VOLIENCE IN NORTH-WEST NIGERIA by Simon Nankap KUMS, Cornelius Ishaya KWEDE

    Published 2023-08-01
    “… The menace of banditry over the years had had a devastating effects on both developed and developing countries of the world alike. This emerging security challenge has threatened the very fabric of the fragile peace the Nigerian State was enjoying; especially, in the Northwest states of Zamfara, Kaduna, Katsina, etc. …”
    Get full text
    Article
  13. 2093

    Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks by Yang Yang, Xiaoyu Jin, Su Yao, Xuesong Qiu, Liu Liu

    Published 2017-06-01
    “…In addition, the introduction of the malicious behavior feedback mechanism ensures the security of sensors in the mobile agent system. The experimental results show that the reputation model of incomplete β distribution can simulate the actual situation well, resist the attacks of malicious agents, and ensure the security of sensors in the system.…”
    Get full text
    Article
  14. 2094

    Determinants of intention to use FinTechs services by accounting students: a mixed methods approach by Anderson Betti Frare, Carla Milena Gonçalves Fernandes, Mariele Castro dos Santos, Alexandre Costa Quintana

    Published 2023-01-01
    “…The study also included the variable “security” as an antecedent. Age and gender were controlled for this study. …”
    Get full text
    Article
  15. 2095

    Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform by Dekai Li, Yen‐wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang

    Published 2022-11-01
    “…Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
    Get full text
    Article
  16. 2096
  17. 2097
  18. 2098

    Toward Intelligent Intrusion Prediction for Wireless Sensor Networks Using Three-Layer Brain-Like Learning by Jun Wu, Song Liu, Zhenyu Zhou, Ming Zhan

    Published 2012-10-01
    “…Hence, the current intrusion detection schemes cannot provide enough security for WSNs, which poses a number of security challenges in WSNs. …”
    Get full text
    Article
  19. 2099

    A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks by Yanxia Chen, Zhe Li, Rongxin Zhu

    Published 2024-12-01
    “…Blockchain technology, recognized for its security, confidentiality, and traceability, is particularly suitable for scenarios requiring secure data exchange. …”
    Get full text
    Article
  20. 2100

    Design and application of system with dual-control of water and electricity based on wireless sensor network and video recognition technology by Hejie Chen, Chunxue Wu, Wending Huang, Yan Wu, Naixue Xiong

    Published 2018-09-01
    “…In order to solve the security problem of the user in wireless sensor network, this article proposes a radio frequency identification mutual security authentication protocol based on shared secret hash function. …”
    Get full text
    Article