Showing 241 - 260 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 241

    Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation by Yi Sun, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, Wenmin Li

    Published 2014-01-01
    “…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
    Get full text
    Article
  2. 242

    Translocality, Remittances, and Food Security in the Ghana-Qatar Migration Corridor by Bernard Owusu, Jonathan Crush

    Published 2025-01-01
    “…The findings reveal that cash remittances play a crucial role in enhancing food security and the overall welfare of households in Ghana. …”
    Get full text
    Article
  3. 243
  4. 244
  5. 245
  6. 246

    Characteristics of security risks of large industrial investments and their management principles by Frigyes Gubics

    Published 2025-01-01
    Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
    Get full text
    Article
  7. 247

    Implementasi Mekanisme End-To-End Security pada IoT Middleware by Eko Sakti Pramukantoro, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, Deny Hari Prasetya Dewa

    Published 2019-05-01
    “…The results show both mechanisms can securely communication between middleware and other parties, but AES-CBS can only secure data payload, not entire data. …”
    Get full text
    Article
  8. 248
  9. 249
  10. 250

    Smart contract-based secure cooperative spectrum sensing algorithm by Chu Ji, Qi Zhu

    Published 2021-12-01
    “…With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.…”
    Get full text
    Article
  11. 251

    QUALITATIVE CHANGES IN JAPAN’S POLICY IN THE FIELD OF MILITARY SECURITY IN 2013 by D. V. Streltsov

    Published 2013-10-01
    “…The article deals with the qualitative changes that have taken place in the course of Japan in the field of military security in December 2012 after the rise of the second Abe Cabinet. …”
    Get full text
    Article
  12. 252

    Indoor Vertical Farming Systems for Food Security and Resource Sustainability by Jiangxiao Qiu, Haimanote K. Bayabil, Yuncong Li

    Published 2020-04-01
    “…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
    Get full text
    Article
  13. 253

    Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme by Huixian Li, Liaojun Pang

    Published 2016-05-01
    “…The scheme proved in this model can only be called selectively secure one. However, from a security perspective, the adaptively secure CP-ABPRE scheme is more desirable. …”
    Get full text
    Article
  14. 254
  15. 255
  16. 256
  17. 257
  18. 258
  19. 259

    ‘Bottom-up securitization’: A visual turn in security studies by M. A. Kucherov, M. V. Kharkevich

    Published 2024-03-01
    Subjects: “…international security…”
    Get full text
    Article
  20. 260

    A Secure Object Detection Technique for Intelligent Transportation Systems by Jueal Mia, M. Hadi Amini

    Published 2024-01-01
    “…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
    Get full text
    Article