Showing 621 - 640 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 621

    Creating and Implementing an Effective and Deterrent National Cyber Security Strategy by Mustafa Senol, Ertugrul Karacuha

    Published 2020-01-01
    “…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
    Get full text
    Article
  2. 622

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks by Jun-Sub Kim, Jin Kwak

    Published 2013-01-01
    “…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
    Get full text
    Article
  3. 623

    The Role of Basic Infrastructure to Strengthen Economic Security in Eastern Indonesia by Firre An Suprapto, Agus Manshur, Sumedi Andono Mulyo, Editha Praditya, Fiktia Alfianita

    Published 2024-08-01
    “…Increasing agricultural productivity has positive implications for Indonesia's food and economic security. Investment in water infrastructure development is needed to support leading sectors.…”
    Get full text
    Article
  4. 624
  5. 625
  6. 626

    Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services by Youngsook Lee, Juryon Paik

    Published 2014-01-01
    “…We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.…”
    Get full text
    Article
  7. 627
  8. 628
  9. 629
  10. 630
  11. 631
  12. 632
  13. 633
  14. 634

    Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2015-08-01
    “…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
    Get full text
    Article
  15. 635

    The Security of Student Information Management System Based upon Blockchain by Mingfeng Yang, Jianying Wang

    Published 2022-01-01
    “…This article aims to study the security of the student information management system based on the blockchain. …”
    Get full text
    Article
  16. 636
  17. 637
  18. 638
  19. 639

    Ritual as mechanism for securing life and averting evil among the Krobo by G. Ossom-Batsa

    Published 2008-06-01
    “…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
    Get full text
    Article
  20. 640