Showing 381 - 400 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 381
  2. 382

    Verification of serialising instructions for security against transient execution attacks by Kushal K. Ponugoti, Sudarshan K. Srinivasan, Nimish Mathure

    Published 2023-07-01
    “…However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. …”
    Get full text
    Article
  3. 383
  4. 384

    Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks by Tung-Shih Su, Mei-Wen Huang, Wei-Shou Li, Wen-Shyong Hsieh

    Published 2012-07-01
    “…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.…”
    Get full text
    Article
  5. 385
  6. 386

    Enhancing Security in International Data Spaces: A STRIDE Framework Approach by Nikola Gavric, Andrii Shalaginov, Aliaksei Andrushevich, Andreas Rumsch, Andrew Paice

    Published 2024-12-01
    “…Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. …”
    Get full text
    Article
  7. 387

    Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security by Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari

    Published 2025-01-01
    “…Quantum Key Distribution (QKD) provides secure communication by leveraging quantum mechanics, with the BB84 protocol being one of its most widely adopted implementations. …”
    Get full text
    Article
  8. 388

    A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System by Ruikang Zhou, Yingxu Lai, Zenghui Liu, Yinong Chen, Xiangzhen Yao, Jiezhong Gong

    Published 2016-03-01
    “…By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. …”
    Get full text
    Article
  9. 389

    An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security by Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. …”
    Get full text
    Article
  10. 390
  11. 391
  12. 392

    Climate change, economic security, and macroeconomic stability: Insights from the EU by Lobonț Oana-Ramona, Vătavu Sorana, Nicolescu Ana-Cristina, Trip Andrei, Costea Florin

    Published 2025-01-01
    “…This research examines the impact of climate change risks on the macroeconomic situation and the security of the economic system in the EU-27 during the 2002-2020 period. …”
    Get full text
    Article
  13. 393
  14. 394
  15. 395
  16. 396
  17. 397

    HERDSMEN AND FARMERS CLASHES IN NORTH CENTRAL NIGERIA: NATIONAL SECURITY IMPLICATIONS by ANGELA AJODO-ADEBANJOKO, ROSEMARY IJEOMA NWOFOR

    Published 2024-07-01
    “…This paper examines the national security implications of herdsmen and farmers conflict on Nigerian national security. …”
    Get full text
    Article
  18. 398
  19. 399
  20. 400