Showing 301 - 320 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 301
  2. 302
  3. 303

    Ritual as mechanism for securing life and averting evil among the Krobo by G. Ossom-Batsa

    Published 2008-06-01
    “…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
    Get full text
    Article
  4. 304

    Reputation-Based Secure Sensor Localization in Wireless Sensor Networks by Jingsha He, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, Wanqing Fu

    Published 2014-01-01
    “…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
    Get full text
    Article
  5. 305
  6. 306

    A secure method of voting and planning based on quadratic voting by Hamid Devisti, Massoud Hadian Dehkordi

    Published 2025-02-01
    “…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
    Get full text
    Article
  7. 307
  8. 308
  9. 309

    Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories by Buryk Myroslav M.

    Published 2024-06-01
    “…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
    Get full text
    Article
  10. 310
  11. 311
  12. 312
  13. 313

    Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks by Qiong Zhang

    Published 2016-07-01
    “…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
    Get full text
    Article
  14. 314

    The Security Needs of International Students: An Analysis in Terms of the Securitization Theory by Arda ÖZKAN, Gülşah TAŞÇI

    Published 2023-06-01
    “…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
    Get full text
    Article
  15. 315
  16. 316

    Load-Balanced Secure Routing Protocol for Wireless Sensor Networks by Wang Xin-sheng, Zhan Yong-zhao, Wang Liang-min

    Published 2013-06-01
    “…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
    Get full text
    Article
  17. 317
  18. 318
  19. 319

    A New Data Coding Algorithm for Secure Communication of Image by Hidayet Oğraş

    Published 2024-11-01
    “…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
    Get full text
    Article
  20. 320

    Formal Security in the Works of Legal Scholars of Pre-Soviet Period by E. E. Silantyeva

    Published 2021-07-01
    Subjects: “…formal security…”
    Get full text
    Article