Showing 3,041 - 3,060 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 3041

    RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext by Hari Murti, Edy Supriyanto, Rara Redjeki, Eka Ardhianto

    Published 2022-12-01
    “…Cryptography and steganography techniques have an important role in securing information. Parallel Encryption with Digit Arithmetic of Covertext (PDAC) encryption model adopts cryptography and steganography for securing messages. …”
    Get full text
    Article
  2. 3042

    A Survey of Artificial Immune System Based Intrusion Detection by Hua Yang, Tao Li, Xinlei Hu, Feng Wang, Yang Zou

    Published 2014-01-01
    “…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
    Get full text
    Article
  3. 3043

    A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding by Haidar Raad Shakir

    Published 2019-01-01
    “…This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid (DNA) sequence operations and the tangent-delay ellipse reflecting the cavity-map system (TD-ERCS). …”
    Get full text
    Article
  4. 3044
  5. 3045

    Living the liquid life: Gender, precarity, and journalism in the post-#metoo era by Melin Margareta, Wiik Jenny

    Published 2024-09-01
    “…Increasing demands for flexibility have institutionalised temporary contracts, eroded job security, and expanded job precarity, with women and young journalists disproportionately affected. …”
    Get full text
    Article
  6. 3046
  7. 3047

    The Design Blueprint for a Large-Scale Telehealth Platform by Rattakorn Poonsuph

    Published 2022-01-01
    “…This design blueprint covers the digital healthcare ecosystem, new patient journey design for digital health services, telehealth functionality design, and an outline of the platform infrastructure and security design. Ultimately, telehealth platforms establish a completed digital healthcare service and new ecosystem that provides better care for every patient worldwide.…”
    Get full text
    Article
  8. 3048

    Postfazione. La fragilità della sovranità tra colonialismi ed epistemologie dei sud del mondo by Flavia Cuturi

    Published 2024-06-01
    “…The contribution aims to highlight dynamics and processes that are common to the articles in the monographic dossier, dedicated to food sovereignty, security and sustainability in different island contexts. …”
    Get full text
    Article
  9. 3049

    Factors Affecting Cloud-Based Accounting Adoption in the Indonesian Banking Sector by Ryandika Ramadhan Al Farishi, Tjun Tjun Lauw

    Published 2025-01-01
    “…In contrast, technological and environmental factors must be considered by banks and the Indonesian government, especially clarity regarding data security protection from cloud adoption to provide confidence to users of cloud-based accounting applications.…”
    Get full text
    Article
  10. 3050

    Disappearance of women and girls in Mexico: Contributions of feminisms for understanding macrosocial processes by María de Lourdes Velasco-Domínguez, Salomé Castañeda-Xochitl

    Published 2020-05-01
    “…This re-search argues that the increase in disappeared girls is associated with two main factors: an economy of dispossession of human lives for the accumulation of capital, which produces specific forms of violence against women and girls, and a systematic violence against women exercised by agents from state security and legal institutions.…”
    Get full text
    Article
  11. 3051

    THE RELATIONSHIP BETWEEN ECONOMIC GROWTH AND MIGRATION IN TERMS OF 14 EUROPEAN UNION COUNTRIES AND TURKEY by Hasan Yavuz, Agnieszka Parlinska

    Published 2022-12-01
    “…The literature on migration is often studied in the economic, political and security fields. This study focuses on the relationship of migration with economic growth. …”
    Get full text
    Article
  12. 3052

    PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN by Gilang Surya Pratama, Agus Munandar

    Published 2025-01-01
    “…Major implementation challenges include data quality, infrastructure limitations, and data security. Development opportunities are identified in blockchain integration, hybrid models, and preprocessing automation. …”
    Get full text
    Article
  13. 3053

    Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics by U. A. Vishniakou, YiWei Xia, Chuyue Yu

    Published 2024-09-01
    “…This system ensures efficient, secure and transparent data processing, optimizing the processes of data registration, authorization and verification. …”
    Get full text
    Article
  14. 3054
  15. 3055

    EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs by Daniel Granlund, Christer Åhlund, Patrik Holmlund

    Published 2015-04-01
    “…Finally, the protocol was verified in terms of security using the AVISPA tool.…”
    Get full text
    Article
  16. 3056

    Spanish refugees in Portugal and the Portuguese solidarity (1936-1945) by Fábio A. Faria

    Published 2024-12-01
    “…Due to its authoritarian nature, Salazar´s regime proved reluctant to receive them and developed a repression directed at these refugees, considered “undesirable,” visible in the increase of the number of border posts and their reinforcement and in the collaboration between different authorities, namely PVDE (State Surveillance and Defense Police), GNR (Republican National Guard), PSP (Public Security Police) and GF (Fiscal Guard), leading to their concentration in large national prisons. …”
    Get full text
    Article
  17. 3057
  18. 3058

    Influencing Factors Analysis on Land-Lost Farmers’ Happiness Based on the Rough DEMATEL Method by Lixia Liu, Tingting Wang, Lei Xie, Xueli Zhan

    Published 2020-01-01
    “…The government can improve the social environment policies, such as land acquisition, social security, and employment to influence other factors and improve the level of happiness of land-losing farmers. …”
    Get full text
    Article
  19. 3059

    Toward Safer E-Commerce Transactions: The Influence of System Quality, Information Accuracy, and Government Oversight by Megawati SIMANJUNTAK, Anna MARIA TRI ANGGRAINI

    Published 2024-12-01
    “…To improve public knowledge about transaction security in e-commerce, thorough socialization and education are needed, targeting all parties involved in online transactions, including marketplaces, payment providers, and delivery services. …”
    Get full text
    Article
  20. 3060

    Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology by Yutang Liu, Qin Zhang

    Published 2022-01-01
    “…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
    Get full text
    Article