Showing 661 - 680 results of 9,720 for search '"security"', query time: 0.06s Refine Results
  1. 661
  2. 662

    Provably secure partially blind signature without trusted PKG by FENG Tao1, PENG Wei1, MA Jian-feng3

    Published 2010-01-01
    “…The proposed scheme satisfies security properties: correctness and partial blindness. …”
    Get full text
    Article
  3. 663

    Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks by Qiong Zhang

    Published 2016-07-01
    “…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
    Get full text
    Article
  4. 664

    The Security Needs of International Students: An Analysis in Terms of the Securitization Theory by Arda ÖZKAN, Gülşah TAŞÇI

    Published 2023-06-01
    “…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
    Get full text
    Article
  5. 665
  6. 666
  7. 667
  8. 668

    Load-Balanced Secure Routing Protocol for Wireless Sensor Networks by Wang Xin-sheng, Zhan Yong-zhao, Wang Liang-min

    Published 2013-06-01
    “…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
    Get full text
    Article
  9. 669
  10. 670
  11. 671

    A survey of attack and defense on human-computer interaction security by Kaiqiang GE, Tieming CHEN

    Published 2019-10-01
    “…With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer interaction security attacks frequently occur.The status of four kinds of human-computer interaction technologies:HID-USB,fingerprint recognition,speech recognition and face recognition,as well as the offensive and defensive benefits were reviewed and analyzed,and the research direction of human-computer interaction security in the future was discussed.At the same time,some suggestions were given.…”
    Get full text
    Article
  12. 672
  13. 673

    A New Data Coding Algorithm for Secure Communication of Image by Hidayet Oğraş

    Published 2024-11-01
    “…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
    Get full text
    Article
  14. 674

    Formal Security in the Works of Legal Scholars of Pre-Soviet Period by E. E. Silantyeva

    Published 2021-07-01
    Subjects: “…formal security…”
    Get full text
    Article
  15. 675
  16. 676

    Management technologies of cyberspace endogenous safety and security test site by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2021-03-01
    Subjects: “…endogenous safety and security…”
    Get full text
    Article
  17. 677
  18. 678

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
    Get full text
    Article
  19. 679

    Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor by M. M. Panyuzheva

    Published 2019-12-01
    Subjects: “…euro-atlantic security system…”
    Get full text
    Article
  20. 680