Showing 1,861 - 1,880 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 1861
  2. 1862
  3. 1863

    AVRUPA BİRLİĞİ ve IRAK KRİZİ : BÖLÜNMEDEN YENİDEN BİRLEŞMEYE UZUN, İNCE BİR YOL by Sevilay Kahraman

    Published 2003-01-01
    “…The aim of this article is to assess the implications of the recent Iraqi crisis for American-European relations, the European Union's evolving Common Foreign and Security Policy/ European Security and Defence Policy and the future prospects for global governance. …”
    Get full text
    Article
  4. 1864
  5. 1865

    Transforming Alliances: A 20-Year Overview of Singapore-US Relations under Lee Hsien Loong by TRUONG HUE

    Published 2025-01-01
    “…It also examines how both countries have expanded their cooperation into non-traditional security areas such as counterterrorism, cybersecurity, and environmental security, adapting to the evolving global security environment. …”
    Get full text
    Article
  6. 1866

    A cross-layer approach to message authentication based on sparse representation for wireless body area networks by Ning Wang, Weiwei Li, Ting Jiang

    Published 2017-03-01
    “…Due to personal privacy, information security is a particularly important issue in wireless body area networks. …”
    Get full text
    Article
  7. 1867

    Cryptanalysis of hyperchaotic S-box generation and image encryption by Mohammad Mazyad Hazzazi, Gulraiz, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai

    Published 2024-12-01
    “…The structure and properties of S-boxes have a significant impact on the overall security of cryptographic systems. This article aims to improve cryptographic security through unique S-box construction methodologies. …”
    Get full text
    Article
  8. 1868
  9. 1869
  10. 1870

    Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol by Yongkai Li, Shubo Liu, Jun Wang, Mengjun Liu

    Published 2016-07-01
    “…We formally analyzed the security of our protocol and results showed that the protocol is secure if the Computational Diffie-Hellman (CDH) problem is intractable. …”
    Get full text
    Article
  11. 1871

    IMPACT OF PENSION SYSTEM REFORMS ON PUBLIC FINANCE EXPENDITURES IN POLAND by Anna Owczarczyk

    Published 2019-12-01
    “…The social security system in each country, if it exists, plays a crucial role in supporting citizens and specific expenditures of the public finance system. …”
    Get full text
    Article
  12. 1872
  13. 1873

    Sécurité sanitaire sous dépendance by Marie Coris, Alain Piveteau, Philippe Gorry, Matthieu Montalban

    Published 2021-07-01
    “…Improving public health security on a sustainable basis is not simply a matter of adjusting economic variables or a few incentives, even on a large budgetary scale. …”
    Get full text
    Article
  14. 1874

    An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature by Yuanpan Zheng, Guangyu Chen, Liguan Guo

    Published 2020-01-01
    “…From the proofs of correctness and security, we know that it does not only has anonymity and traceability of the group signature scheme but also has unforgeability and forward security. …”
    Get full text
    Article
  15. 1875
  16. 1876
  17. 1877
  18. 1878

    AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid by Jongbin Ko, Hyunwoo Lim, Seokjun Lee, Taeshik Shon

    Published 2014-01-01
    “…Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. …”
    Get full text
    Article
  19. 1879

    Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah by Ruby Haris, Alva Hendi Muhammad, Asro Nasiri

    Published 2024-12-01
    “…Surveys were conducted with decision-makers and technical managers related to information security. The results of the study show that decision-makers prioritize the information security management framework, while technical managers focus more on technological aspects. …”
    Get full text
    Article
  20. 1880

    Price Surges in Basic Necessities — Redistribution of Burdens Required by Irene Becker

    Published 2022-09-01
    “…Appropriate measures would be the payment of inflation compensation for those receiving basic security, a reform of the updating of basic security benefits and an income-related transfer payment for households without basic security. …”
    Get full text
    Article