Showing 641 - 660 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 641
  2. 642
  3. 643

    Provable secure mutual authentication protocol for RFID in the standard model by Feng XIAO, Ya-jian, ZHOU, Jing-xian ZHOU, Xin-xin NIU

    Published 2013-04-01
    “…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
    Get full text
    Article
  4. 644
  5. 645

    Reputation-Based Secure Sensor Localization in Wireless Sensor Networks by Jingsha He, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, Wanqing Fu

    Published 2014-01-01
    “…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
    Get full text
    Article
  6. 646
  7. 647
  8. 648
  9. 649

    A European Mechanism for the Issuance and Initial Distribution of Debt Securities by Georgios Pavlidis

    Published 2020-06-01
    “…Abstract Although the European Union (EU) has implemented initiatives and common rules regarding securities settlements, no similar integration initiatives have been proposed for the issuance and initial distribution of debt securities. …”
    Get full text
    Article
  10. 650
  11. 651

    A secure method of voting and planning based on quadratic voting by Hamid Devisti, Massoud Hadian Dehkordi

    Published 2025-02-01
    “…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
    Get full text
    Article
  12. 652
  13. 653
  14. 654
  15. 655
  16. 656

    Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories by Buryk Myroslav M.

    Published 2024-06-01
    “…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
    Get full text
    Article
  17. 657
  18. 658
  19. 659
  20. 660