Showing 501 - 520 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 501
  2. 502
  3. 503

    Managing economic climate security: theoretical and applied aspects by E. N. Yakovleva

    Published 2022-01-01
    “…The article proposes to consider climate security as an important factor in the sustainable development of the economy. …”
    Get full text
    Article
  4. 504

    Benelux countries’ security strategies: between europeanism and atlanticism by Anastasia A. Posazhennikova

    Published 2024-08-01
    “…In the article, transformation of the foreign policy and security strategies of the Benelux countries – Belgium, the Netherlands and Luxembourg – is analyzed against the exacerbating conflict in Ukraine. …”
    Get full text
    Article
  5. 505
  6. 506

    Heterogeneous Expectations and Speculative Behavior in Insurance-Linked Securities by Min Zheng

    Published 2015-01-01
    “…Within the framework of heterogeneous agent models, this paper analyzes the impact factors on the issuance of an insurance-linked security (ILS), and gives an ILS pricing formula and the conditions of existence and stability of the issue price. …”
    Get full text
    Article
  7. 507
  8. 508
  9. 509

    Innovative resource-saving security strategies for IoT devices by Inna Rozlomii, Andrii Yarmilko, Serhii Naumenko

    Published 2025-01-01
    “…Emphasis is placed on developing adaptive security mechanisms that can effectively respond to dynamic operational conditions and resource constraints. …”
    Get full text
    Article
  10. 510
  11. 511

    Host security assessment method based on attack graph by Hongyu YANG, Haihang YUAN, Liang ZHANG

    Published 2022-02-01
    Subjects: “…host security…”
    Get full text
    Article
  12. 512
  13. 513
  14. 514
  15. 515

    Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation by Yi Sun, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, Wenmin Li

    Published 2014-01-01
    “…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
    Get full text
    Article
  16. 516

    Translocality, Remittances, and Food Security in the Ghana-Qatar Migration Corridor by Bernard Owusu, Jonathan Crush

    Published 2025-01-01
    “…The findings reveal that cash remittances play a crucial role in enhancing food security and the overall welfare of households in Ghana. …”
    Get full text
    Article
  17. 517
  18. 518
  19. 519

    Secure IoT data dissemination with blockchain and transfer learning techniques by Pooja Anand, Yashwant Singh, Harvinder Singh

    Published 2025-01-01
    “…However, most existing systems for storing and disseminating IoT data streams lack reliability, security, and transparency, primarily due to centralized architectures that create single points of failure. …”
    Get full text
    Article
  20. 520