Showing 241 - 260 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 241

    Combined strategies for managing the securities portfolio structure by M. A. Sevodin

    Published 2024-04-01
    Subjects: “…securities portfolio…”
    Get full text
    Article
  2. 242
  3. 243
  4. 244

    Provable secure trusted protocol for network storage by DUAN Xin-dong, MA Jian-feng

    Published 2011-01-01
    Subjects: “…provable security…”
    Get full text
    Article
  5. 245
  6. 246
  7. 247
  8. 248

    Security analysis on a kind of group signatures by SI Tao-zhi1, WANG Ze-cheng1, LI Zhi-bin1, ZHOU Zhen-jiang1

    Published 2003-01-01
    “…In this paper, we show there are still some security leaks in these schemes, and give some methods of forgery attack.…”
    Get full text
    Article
  9. 249
  10. 250
  11. 251

    Co-Secure Domination Number in Some Graphs by Jiatong Cui, Tianhao Li, Jiayuan Zhang, Xiaodong Chen, Liming Xiong

    Published 2024-12-01
    Subjects: “…co-secure dominating set…”
    Get full text
    Article
  12. 252

    Security and Privacy in Metaverse: A Comprehensive Survey by Yan Huang, Yi (Joy) Li, Zhipeng Cai

    Published 2023-06-01
    “…We then identify and discuss more potential critical security and privacy issues that can be caused by combining the four characteristics. …”
    Get full text
    Article
  13. 253
  14. 254
  15. 255

    The concept of interethnic security of the region (on the example of Tatarstan) by Rezida R. Khusnutdinova, Il’dar M. Yusupov

    Published 2023-08-01
    “…An indicator of unstable security is an increase intension. Subjectively, security is expressed in the absence of fear of external threats [1]. …”
    Get full text
    Article
  16. 256

    Secure fault-tolerant code for cloud storage by Peng-xu TAN, Yue CHEN, Ju-long LAN, Hong-yong JIA

    Published 2014-03-01
    “…A secure regenerating code,called SRCS was proposed to solve the security problem during the process of the fault-tolerant of storage systems,especially the storage system in an extremely open environment such as cloud computing and cloud storage.SRCS achieves the security of the encoding matrix in the regenerating code using the threshold public-key encryption with low redundancy and high efficiency.It is proven that SRCS is secure in the semi-adaptive model using decisional BDHE assumption.…”
    Get full text
    Article
  17. 257

    Secure Pesticide Storage: Facility Size and Location by Thomas W. Dean

    Published 2004-10-01
    “… This document identifies and answers two basic questions that typically arise when planning to build a secure pesticide storage facility. This document is Fact Sheet PI-29, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  18. 258
  19. 259
  20. 260

    WiFi and WiMAX Secure Deployments by Panagiotis Trimintzios, George Georgiou

    Published 2010-01-01
    “…In this article, we present the security characteristics for the WiFi and the WiMAX networks. …”
    Get full text
    Article