Showing 2,121 - 2,140 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2121
  2. 2122
  3. 2123

    Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim

    Published 2020-01-01
    “…The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP. …”
    Get full text
    Article
  4. 2124

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. …”
    Get full text
    Article
  5. 2125

    IoT enabled data protection with substitution box for lightweight ciphers by K.B. Sarmila, S.V. Manisekaran

    Published 2025-03-01
    “…A lightweight cryptographic design is required for securing the data revolving around constrained devices. …”
    Get full text
    Article
  6. 2126
  7. 2127

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  8. 2128
  9. 2129

    Qualified Digital Ecosystems As an Academic Information System Framework in The Industrial 4.0 by Ino Sulistiani, Nursaeni, Bobur Sobirov

    Published 2024-12-01
    “…The research also utilizes ISO 9126 and ISO/IEC 25010 quality models to establish usability and security standards, while the Academic Information System Quality Instrument (AISQI) is introduced to evaluate system performance. …”
    Get full text
    Article
  10. 2130

    Blockchain-IoT Healthcare Applications and Trends: A Review by Wafaa A. N. A. Al-Nbhany, Ammar T. Zahary, Asma A. Al-Shargabi

    Published 2024-01-01
    “…Integrating blockchain technology with IoT extensively helps provide basic security requirements owing to the built-in security structure of the blockchain. …”
    Get full text
    Article
  11. 2131
  12. 2132

    Investigation the Citizen\'s Satisfaction from the elements of sense of belonging (Case study: Golha Residential Complex of Rasht) by Matin Farzidi, Reza Parvizi, Maryam Daneshshakib, SeyedReza Azadeh

    Published 2022-09-01
    “…Nowadays, the lack of attachment is a significant point in the construction of towns, which is demonstrated with criteria such as lack of environmental attraction and visual qualities, lack of readability, security, and so on. These factors will affect people's relationship with the environment around them and thus their satisfaction. …”
    Get full text
    Article
  13. 2133
  14. 2134

    Urban Sustainability Based on Citizens’ Participation (Case Study - the City of Sabzevar) by Hadi Hosseini, Husayn Ghodrati, Mohammad Mireh, Yaghoub Zangeneh

    Published 2013-05-01
    “…Reliability coefficient for all items was 0.89 and for all dimensions was more than 0.72 except for the sense of social security dimension. Variables in this research included age, years of residence in the city/neighborhood, education, ownership of residential house, citizen's participation in city affairs management, social interactions, and the citizens’ opinion about social security, and life satisfaction. …”
    Get full text
    Article
  15. 2135

    A high speed processor for elliptic curve cryptography over NIST prime field by Xianghong Hu, Xueming Li, Xin Zheng, Yuan Liu, Xiaoming Xiong

    Published 2022-07-01
    “…Abstract Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. It is challenging to implement a scalar multiplication (SM) operation which has the highest computational complexity in ECC. …”
    Get full text
    Article
  16. 2136
  17. 2137
  18. 2138

    Fiscal Decentralisation and Services Delivery in Mbarara Central Market. by Ainembabazi, Blair

    Published 2024
    “…Although fiscal decentralization is often promoted as a means to enhance local governance and improve service provision, its actual impact on security, sanitation, and utility services is not well understood. …”
    Get full text
    Thesis
  19. 2139
  20. 2140