Showing 441 - 460 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 441

    Juridical construction of socio-ecological security: Indonesia’s vulnerability to climate change by Atika Sari Diah Apriani, Triatmodjo Marsudi, Purwanto Harry

    Published 2025-01-01
    “…This research is a normative study that examines the legal framework of socio-ecological security concerning Indonesia’s vulnerability as an archipelagic nation due to the impacts of climate change. …”
    Get full text
    Article
  2. 442

    Analysis of Russian Federation Foreign Policy in the Field of International Information Security by E. S. Zinovieva

    Published 2014-12-01
    Subjects: “…international information security…”
    Get full text
    Article
  3. 443

    Producing secure multimodal biometric descriptors using artificial neural networks by Dogu Cagdas Atilla, Raghad Saeed Hasan Alzuhairi, Cagatay Aydin

    Published 2021-03-01
    “…Abstract With the rapidly growing use of biometric authentication systems, the security of these systems and the privacy of users have attracted significant attention in recent years. …”
    Get full text
    Article
  4. 444
  5. 445
  6. 446

    Digital economic security of Russian organizations, industries and Russia as a whole by S. A. Antonov, A. V. Savchenko, O. G. Kazeeva

    Published 2019-09-01
    Subjects: “…digital economic security of the organization…”
    Get full text
    Article
  7. 447
  8. 448
  9. 449

    Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection by Yu’e Jiang, Jiaxiang Liu

    Published 2017-01-01
    “…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
    Get full text
    Article
  10. 450

    Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results by S. Krut, Ch. Azevedo Coste, P. Chabloz

    Published 2011-01-01
    “…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
    Get full text
    Article
  11. 451
  12. 452

    Access to Network Login by Three-Factor Authentication for Effective Information Security by S. Vaithyasubramanian, A. Christy, D. Saravanan

    Published 2016-01-01
    “…In this way managing additional secret key includes an additional layer of security.…”
    Get full text
    Article
  13. 453
  14. 454

    An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment by Vinothkumar Muthurajan, Balaji Narayanasamy

    Published 2016-01-01
    “…Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. …”
    Get full text
    Article
  15. 455
  16. 456

    A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects by Hui He, Dongyan Zhang, Min Liu, Weizhe Zhang, Dongmin Gao

    Published 2014-01-01
    “…Software security defects have a serious impact on the software quality and reliability. …”
    Get full text
    Article
  17. 457
  18. 458
  19. 459

    A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices by Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. …”
    Get full text
    Article
  20. 460

    TVD‐PB logic circuit based on camouflaging circuit for IoT security by Yuejun Zhang, Qiufeng Wu, Pengjun Wang, Liang Wen, Zhicun Luan, Chongyan Gu

    Published 2022-01-01
    “…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
    Get full text
    Article