Showing 3,101 - 3,120 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3101

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing by Jue-Sam Chou

    Published 2012-01-01
    “…Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. …”
    Get full text
    Article
  2. 3102

    Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ by Ben Roelens

    Published 2021-04-01
    “…This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. …”
    Get full text
    Article
  3. 3103

    Debt load impact on sustainable development of Russian regions by Yu. S. Lisachkina

    Published 2024-12-01
    “…The authors of the study faced the following tasks: to conduct a comparative assessment of regional sustainable development and debt load, to consider the directions for effective management of the load as an element of economic security of the constituent entities, as well as to analyze the economic essence and peculiarities of formation of the Russian regions’ public debt. …”
    Get full text
    Article
  4. 3104

    The Neglected Traditional Enset (Ensete ventricosum) Crop Landraces for the Sustainable Livelihood of the Local People in Southern Ethiopia by Newarinesh Feleke, Wondimagegnehu Tekalign

    Published 2022-01-01
    “…Enset (Ensete ventricosum, Musaceae) is a neglected traditional multipurpose crop plant critical for Ethiopian food security. It has drawn a lot of attention in the last few years. …”
    Get full text
    Article
  5. 3105

    Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare by Mojca Volk, Janez Sterle, Urban Sedlar

    Published 2015-10-01
    “…The first mechanism provides secure submission of health-related observations into a hospital information system, whereas the second mechanism enables secure short-term sharing of observations without storage.…”
    Get full text
    Article
  6. 3106

    The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food by Soohyoun Ahn, Keith R. Schneider, Michelle D. Danyluk, Renee Goodrich-Schneider

    Published 2014-09-01
    “…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
    Get full text
    Article
  7. 3107

    5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix by Geeta Biban, Renu Chugh, Anju Panwar, Mohammad Sajid

    Published 2024-01-01
    “…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
    Get full text
    Article
  8. 3108
  9. 3109

    Prioritizinghydrological erosion-prone response units in Latyan catchment by Ali ahmad abadi, amir karam, Mohsen PourbashirHir

    Published 2015-12-01
    “…Soil erosion in watersheds, causing problems such as the loss of agricultural land productivity and reduce soil surface layer, endangering the life of reservoirs and water utilities, loss of soil fertility, increasing flood, threatening human food security, etc. The negative effects of soil erosion, watershed management operations to improve care. …”
    Get full text
    Article
  10. 3110

    Perspectives of Turkish foreign policy based on analysis of Romanian documents by Ionuț Cojocaru

    Published 2024-09-01
    “…The Treaty of Lausanne and then the Treaty of Montreux were vital – in the first – for the security of the new Turkish state, but also for the states bordering the Black Sea. …”
    Get full text
    Article
  11. 3111

    Use of biological control agents for managing fungal pathogens in Solanaceae crops: progress and future perspectives—a review by Sinhle Madlhophe, Udoka Vitus Ogugua, Fikile Nelly Makhubu, Sandiswa Figlan

    Published 2025-01-01
    “…Abstract The growing global population has intensified concerns about food security, making it essential to produce crops sustainably to meet increasing demands without harming the environment. …”
    Get full text
    Article
  12. 3112
  13. 3113
  14. 3114

    SCondi: A Smart Context Distribution Framework Based on a Messaging Service for the Internet of Things by Jongmoon Park, Myung-Joon Lee

    Published 2014-01-01
    “…The context channel provides a pluggable filter mechanism that supports effective extraction, tailoring, authentication, and security of information.…”
    Get full text
    Article
  15. 3115

    THE POLITICS OF APPOINTING POLITICAL AND CARREER DIPLOMATS’ IN NIGERIA: Understanding the Nexus by MAHDI ABUBAKAR ABBA

    Published 2023-12-01
    “…However, it requires legislative (Senate) confirmation and security clearance. The paper recommends that the Nigerian government need to review the application of federal character principle and quota system in the appointment of ambassadors. …”
    Get full text
    Article
  16. 3116

    Espaces de l’insécurité : réalités territoriales et réponses locales à la délinquance by Igor Lefèvre

    Published 2014-07-01
    “…It thus questioned the relevance of the résidentialist paradigm (that is to say, the assumption of a crime would depend in form and intensity of urban, sociological , economic and demographic patterns and trends) and its impact on work organization and missions of law enforcement forces, but also all the local actors involved in security policy and crime prevention. At the level of Midi-Pyrénées, this contribution will give synthetically to know which transformations frameworks and patterns of public policies could emerge in the decade 2000-2010, in different situations, but all with a common element: the need to respond to situations perceived by local actors as risky or dangerous for the safety of citizens.…”
    Get full text
    Article
  17. 3117

    REGIONS OF RUSSIA IN THE CORONAVIRUS PANDEMIC by N. Z. Zotikov

    Published 2020-12-01
    “…At  the present stage of development, taking into account the changed economic situation in the world, the issues of  economic security of the regions are of particular importance. …”
    Get full text
    Article
  18. 3118

    20th Anniversary of 9-11: Corporate Disaster Preparedness, Lessons Learned, and Ways Forward by Stefane Kabene, Said Baadel

    Published 2021-08-01
    “…This paper deals with security crisis and disaster management and some effective approaches companies should take to deal with these issues. …”
    Get full text
    Article
  19. 3119
  20. 3120

    Control system for aquatic biological resources in the Northern fisheries basin of Russia by S. S. Vopilovskii

    Published 2022-01-01
    “…It has been determined that the allocation of aquatic biological resources for industrial fishing is managed on the basis of Russian regulatory legal acts, and the implementation of the tasks of developing the fishery sector and ensuring the country’s food security is consistent with the implementation of the Basic State Policy of Russia. …”
    Get full text
    Article