Showing 281 - 300 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 281

    Small Arms and Small Countries: Firearms and the International Security Agenda by Carla Álvarez Velasco

    Published 2016-05-01
    “…This article examines the emergence of the small arms trade on the international political agenda as a growing security threat. Employing the theoretical framework proposed by the Copenhagen School, this article argues that the issue of small arms gained traction at the international level in the context of the post-Cold War. …”
    Get full text
    Article
  2. 282

    Container Security Device Chain Network for Safe Railway Transportation by Sungryul Kim, Jeonghyun Kim, Younghwan Yoo

    Published 2014-11-01
    “…This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. …”
    Get full text
    Article
  3. 283
  4. 284
  5. 285
  6. 286
  7. 287
  8. 288

    Cooperative secure transmission against collusive eavesdroppers in Internet of Things by Xin Fan, Yan Huo

    Published 2020-06-01
    “…As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. …”
    Get full text
    Article
  9. 289

    Creating and Implementing an Effective and Deterrent National Cyber Security Strategy by Mustafa Senol, Ertugrul Karacuha

    Published 2020-01-01
    “…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
    Get full text
    Article
  10. 290

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks by Jun-Sub Kim, Jin Kwak

    Published 2013-01-01
    “…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
    Get full text
    Article
  11. 291
  12. 292

    Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services by Youngsook Lee, Juryon Paik

    Published 2014-01-01
    “…We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.…”
    Get full text
    Article
  13. 293
  14. 294
  15. 295
  16. 296
  17. 297
  18. 298

    Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2015-08-01
    “…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
    Get full text
    Article
  19. 299

    The Security of Student Information Management System Based upon Blockchain by Mingfeng Yang, Jianying Wang

    Published 2022-01-01
    “…This article aims to study the security of the student information management system based on the blockchain. …”
    Get full text
    Article
  20. 300