Showing 461 - 480 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 461
  2. 462
  3. 463

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
    Get full text
    Article
  4. 464

    A Secure RFID Authentication Protocol Adopting Error Correction Code by Chien-Ming Chen, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, Hung-Min Sun

    Published 2014-01-01
    “…RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. …”
    Get full text
    Article
  5. 465
  6. 466

    A data pipeline for secure extraction and sharing of social determinants of health. by Tyler Schappe, Lisa M McElroy, Moronke Ogundolie, Roland Matsouaka, Ursula Rogers, Nrupen A Bhavsar

    Published 2025-01-01
    “…<h4>Discussion and conclusion</h4>We describe a novel pipeline that can facilitate the secure acquisition and sharing of neighborhood-level SDOH without sharing PHI. …”
    Get full text
    Article
  7. 467

    THE NEXUS BETWEEN ARMED CONFLICT, SECURITY, PEACE EDUCATION AND DEVELOPMENT IN NIGERIA by SAMUEL BULUS WADZANI, OGUNDAIRO KAYODE EMMANUEL, AUGUSTINE ECHOBU OGWUCHE

    Published 2023-09-01
    “… This paper examines the interconnection between armed conflict, security, education, peace, and development in Nigeria. …”
    Get full text
    Article
  8. 468
  9. 469

    Constructing RBAC Based Security Model in u-Healthcare Service Platform by Moon Sun Shin, Heung Seok Jeon, Yong Wan Ju, Bum Ju Lee, Seon-Phil Jeong

    Published 2015-01-01
    “…In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. …”
    Get full text
    Article
  10. 470

    Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks by Jun-Sub Kim, Jin Kwak

    Published 2014-04-01
    “…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. …”
    Get full text
    Article
  11. 471

    The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking by Xingwang Wang

    Published 2017-01-01
    “…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. In this scenario, security and privacy have become the decisive factors. …”
    Get full text
    Article
  12. 472
  13. 473

    MECHANISMS FOR ENSURING SUSTAINABLE DEVELOPMENT AND FOOD SECURITY OF A SOVEREIGN COUNTRY by N. V. Mayorova, M. K. Mayorov, T. V. Bakhturazova, D. A. Edelev

    Published 2020-05-01
    “…The problems of food security and tasks aimed at preventing internal and external threats, sustainable development of domestic production sufficient to ensure food independence and state sovereignty have been considered.…”
    Get full text
    Article
  14. 474

    Reconstructing a lightweight security protocol in the radio‐frequency identification systems by Alireza Abdellahi Khorasgani, Mahdi Sajadieh, Mohammad Rouhollah Yazdani

    Published 2023-07-01
    “…Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. …”
    Get full text
    Article
  15. 475
  16. 476

    ORGANIZATIONAL - METHODICAL FEATURES OF EVELUATING THE EFFECTIVENESS OF SUSTEMS ECONOMIC SECURITY THE FIRM by M. Vlasenko

    Published 2016-03-01
    “…The study revealed the main methods of ensuring the economic security of the organization, their characteristics and differences from other management techniques. …”
    Get full text
    Article
  17. 477
  18. 478
  19. 479

    Fine-Grained Support of Security Services for Resource Constrained Internet of Things by Hyo Jin Ban, Jaeduck Choi, Namhi Kang

    Published 2016-05-01
    “…To improve such an issue, this paper proposes a secure but efficient scheme for resource constrained things. …”
    Get full text
    Article
  20. 480