Showing 8,801 - 8,820 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 8801

    Liturgiese sang op die kruispad tussen tradisie en vernuwing by WML Strydom

    Published 1997-12-01
    “…A well-founded insight in the following aspects will secure a sound balance between tradition and renewal in a present day liturgical theology and practice: the historical background of the relationship between liturgy and singing, the liturgical function of singing, liturgical communication through singing, as well as a hymnological aesthetics and liturgical ethics. …”
    Get full text
    Article
  2. 8802

    Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans by Ethan T. Noel, Elizabeth F. Pienaar, Mike Orlando

    Published 2017-06-01
    “…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.­http://edis.ifas.ufl.edu/uw429 …”
    Get full text
    Article
  3. 8803

    Sustainability Goals in Economic Policy — Economic Considerations by Achim Wambach, Christine Zulehner

    Published 2022-05-01
    “…This should be prevented by formulating the goals as concretely and legally securely as possible and by building up competence in the authorities entrusted with their implementation.…”
    Get full text
    Article
  4. 8804

    USE OF CORPORATE ACCOUNTING AND CONTROL SYSTEM IN MANAGEMENT by T. M. Rogulenko, A. V. Bodyko

    Published 2019-12-01
    “…According to the results of the study a conclusion has been made, that the corporate accounting and control system is one of the modern algorithmized and automated tools of the corporate management system of economic development strategy in a highly competitive environment and the unpredictability of the behavior of economic entities in the market of goods, works, services, currency, securities, etc., which is integrated with other management systems in the mode of their parallel automation.…”
    Get full text
    Article
  5. 8805

    ID-based signature without trusted PKG by ZHOU Liang1, LI Da-peng2, YANG Yi-xian1

    Published 2008-01-01
    “…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
    Get full text
    Article
  6. 8806

    Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems by Benjamin Glas, Oliver Sander, Vitali Stuckert, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. …”
    Get full text
    Article
  7. 8807

    Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans by Ethan T. Noel, Elizabeth F. Pienaar, Mike Orlando

    Published 2017-06-01
    “…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.­http://edis.ifas.ufl.edu/uw429 …”
    Get full text
    Article
  8. 8808

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    “…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
    Get full text
    Article
  9. 8809

    Verifiable multi-secret sharing schemes applicable to arbitrary access structures by ZHANG Fu-tai1, WANG Yu-min2

    Published 2007-01-01
    “…Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the following properties: multiple secrets can be shared at the same time in a group of shareholders.The secret shares sent to shareholders are publicly verifiable.The public information with respect to each shared secret is publicly verifiable.And the supply of false shares in the process of secret recovery can be prevented.Analysis shows that the verifiable multi-secret sharing schemes constructed by our method are not only secure,but also efficient.…”
    Get full text
    Article
  10. 8810

    Cattell-Braasch Maneuver: A Gadget to Manipulate Abdominal Aortic Aneurysm in a Patient with a Left-Sided Inferior Vena Cava by Akiko Tobe, Takuro Shirasu, Takatoshi Furuya, Motoki Nagai, Yukihiro Nomura

    Published 2019-01-01
    “…He underwent open surgery, and we employed the Cattell-Braasch maneuver to approach the abdominal aortic aneurysm from the right side. This enabled securing of the abdominal aortic aneurysm neck without mobilizing or dissecting the inferior vena cava. …”
    Get full text
    Article
  11. 8811

    Editorial Vol9 no2 by Alan Macquarrie

    Published 2010-10-01
    “…We have been fortunate in securing the publication of the main papers from this inspiring event, and these form the core of this issue of the Scottish Journal of Residential Child Care. …”
    Article
  12. 8812

    Farm gate profitability of organic and conventional farming systems in the tropics by Amritbir Riar, Eva Goldmann, David Bautze, Johanna Rüegg, Gurbir S. Bhullar, Noah Adamtey, Monika Schneider, Beate Huber, Laura Armengot

    Published 2024-12-01
    “…In instances where premium prices for non-cash crops are secured, their profitability can even surpass that of cash crops. …”
    Get full text
    Article
  13. 8813

    Treatment of Spontaneous Subarachnoid Hemorrhage: A 20‐Year National Inpatient Sample Review by Joshua Feler, Dylan Wolman, Radmehr Torabi, Jia‐Shu Chen, Abigail Teshome, Rahul Sastry, Curtis Doberstein, Mahesh Jayaraman, Krisztina Moldovan, Ali Mahta

    Published 2025-01-01
    “…Patients undergoing surgery to secure an aneurysm were more severely ill through time yet experienced a stable hospital mortality rate.…”
    Get full text
    Article
  14. 8814

    Bedřich ze Strážnice a husitské posádky ve Slezsku by Martin Čapský

    Published 2020-12-01
    “…In Silesia, the priest Bedřich of Strážnice helped to transform the system operating among the garrisons in Central and South Moravia, including the collection of food in the form of tributes, obtaining the spoils of war, supplying through the convoys sent from the Hussite domain, and the cooperation with local elites. At the same time, securing supplies determined the main features of military operations. …”
    Get full text
    Article
  15. 8815

    Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks by Tamás Holczer, Levente Buttyán

    Published 2011-10-01
    “…More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. …”
    Get full text
    Article
  16. 8816

    Attribute-based encryption with hidden policies in the access tree by Yan SONG, Zhen HAN, Feng-mei LIU, Lei LIU

    Published 2015-09-01
    “…The existing policies-hidden attribute-based encryption (ABE) schemes could only support a limited access structure,which resulted in weak expressiveness.A new structure of access tree was thus proposed to integrate attribute hiding and secret sharing into “and” gate,“or” gate and “threshold” gate.Then,a tree-based policies-hidden scheme was constructed by using composite order bilinear groups.Under dual system encryption,the scheme was proved to be secure.Furthermore,the analysis and experiment demonstrate that the scheme realize policies-hidden in the complex ac-cess structure without increasing the overhead of computation.As a result,it is more feasible and flexible for applica-tions.…”
    Get full text
    Article
  17. 8817

    Integrity verification protocol based on privacy homomorphism data aggregation by Xing LI, Chun-yan LI, Liang-min WANG

    Published 2014-11-01
    “…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
    Get full text
    Article
  18. 8818

    Sovereign Debt Restructurings in Grenada: Causes, Processes, Outcomes, and Lessons Learned by Tamon Asonuma, Mike Xin Li, Michael G. Papaioannou, Saji Thomas, Eriko Togo

    Published 2018-08-01
    “…However, the first restructuring was not able to secure long-term debt sustainability. Grenada’s restructuring experience shows the importance of (1) establishing appropriate debt restructuring objectives; (2) committing to policy reforms and maintaining ownership of the restructuring goals; and (3) engaging closely and having clear communications with creditors.…”
    Get full text
    Article
  19. 8819

    Piracy around the Horn of Africa by Joshua Ho

    Published 2009-09-01
    “…Piracy around the Horn of Africa has risen to a level serious enough for the international community to take concerted action to secure an international sea lane. However, the efforts so far have been initiated mainly by the international community while regional efforts are only just beginning. …”
    Get full text
    Article
  20. 8820

    Évaluer l’impact d’un changement d’échelle sur la durabilité des services d’eau : la méthode ABAFAD by Antoine Brochet , Christophe Wittner

    “…However, due to the sociotechnical characteristics of drinking water utilities, these stakes (renewal of the heritage, securing the water supply, etc.) appear decisive. We are formalizing here a theoretical-empirical method called "ABAFAD" which enables the evaluation of future impacts according to two hypotheses: that of a fragmentation of the administrative organization of water services, and that of a mutualization. …”
    Get full text
    Article