Showing 2,161 - 2,180 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2161

    A chaotic digital signature algorithm based on a dynamic substitution box by Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, Miguel Gabriel Villarreal-Cervantes

    Published 2025-01-01
    “…In addition, to enhance security, this work uses a 2048-bit prime, double the length frequently used. …”
    Get full text
    Article
  2. 2162

    An Integrated Image Encryption Scheme Based on Elliptic Curve by Ijaz Khalid, Tariq Shah, Sayed M. Eldin, Dawood Shah, Muhammad Asif, Imran Saddique

    Published 2023-01-01
    “…Due to the extensive demand for digital images across all fields, the security of multimedia data over insecure networks is a challenging task. …”
    Get full text
    Article
  3. 2163
  4. 2164

    Refugee securitization and the challenges of formal integration: case of Somali refugees in Kenya and Ethiopia by Fred N. Ikanda, Abdirahman A. Muhumad, Jana Kuhnt

    Published 2025-01-01
    “…Policymakers and the media prominently feature the migration-security connection and depict refugees as threats to internal security, linking their presence to acts of terrorism and crime. …”
    Get full text
    Article
  5. 2165
  6. 2166

    Economic impact of fetal wastage and common diseases, along with their incidence rates and seasonal variations, at an abattoir in FCT, Nigeria. by Ibrahim Dauda Dauda, Abdulhakeem Binhambali, Abdurrahman Hassan Jibril, Zainab Oyiza Idris, Farhan Rhidor Akorede

    Published 2025-01-01
    “…The notable economic losses from condemned organs also underscore the necessity of implementing pregnancy tests for female animals before slaughter to protect food security and support the nation's economy. These findings highlight the essential role of abattoirs in improving food security, detecting zoonotic diseases, and bolstering public health and economic stability in low-income countries.…”
    Get full text
    Article
  7. 2167
  8. 2168

    Law enforcement activities of the National Guard under martial law by I. V. Shmahailo

    Published 2024-12-01
    “…Its functioning is due to the threat to public security and order of the state, in particular from the Russian Federation. …”
    Get full text
    Article
  9. 2169

    User Needs of Online Tutoring Applications Using House of Quality by Qurrata Aini, Eko Ruddy Cahyadi, Faqih Udin

    Published 2025-01-01
    “…Conclusion: The top user priorities for online tutoring applications are security and privacy, performance, and information. …”
    Get full text
    Article
  10. 2170

    Web-Based File Sharing System: A Case Study of Kabale University. by Akandinda, Abraham

    Published 2023
    “…Security, user - friendly and cross platform capability are the main purposes of the new Web-based File Sharing System. …”
    Get full text
    Thesis
  11. 2171
  12. 2172

    The financial character of policing in Tunisia: collusions, extraversion and the criminalization of informality by Daniela Musina

    Published 2024-07-01
    “…This article attempts to shed light on the development of a financial/security assemblages in Tunisia, from an international political sociology perspective that looks at the development of practices of security and policing from a transnational and postcolonial vantage point. …”
    Get full text
    Article
  13. 2173
  14. 2174

    Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies by Salman Ahmed, Nabihah Ahmad, Nasir Ali Shah, Ghulam E. Mustafa Abro, Ardhi Wijayanto, Abdinasir Hirsi, Abdul Rehman Altaf

    Published 2025-01-01
    “…The Advanced Encryption Standard (AES) remains the benchmark for securing IoT systems while balancing low power consumption, minimal area usage, and moderate throughput with high security. …”
    Get full text
    Article
  15. 2175
  16. 2176
  17. 2177
  18. 2178
  19. 2179
  20. 2180

    Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map by Jian-feng Zhao, Shu-ying Wang, Li-tao Zhang, Xiao-yan Wang

    Published 2017-01-01
    “…The obtained simulation results and extensive security analyses demonstrate the high level of security of the algorithm and show its robustness against various types of attacks.…”
    Get full text
    Article