Showing 41 - 60 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 41

    Security Requirements for Multimedia Archives by Sang Bae Park

    Published 2015-01-01
    “…This longevity of contents causes new security issues that threat the archive systems. In this paper, we discuss these new security issues in perspective. …”
    Get full text
    Article
  2. 42
  3. 43

    The Issue of Food Security in Cuba by José Alvarez

    Published 2004-09-01
    “…FE483/FE483: The Issue of Food Security in Cuba (ufl.edu) …”
    Get full text
    Article
  4. 44
  5. 45

    The Issue of Food Security in Cuba by José Alvarez

    Published 2004-09-01
    “…FE483/FE483: The Issue of Food Security in Cuba (ufl.edu) …”
    Get full text
    Article
  6. 46
  7. 47

    THE MONITORING OF ECONOMIC SECURITY OF THE ORGANIZATION by V. Lokhanova

    Published 2016-02-01
    “…In the article the concept of monitoring of economic security of the organization is defined from the point of view of its relevance and functionality. …”
    Get full text
    Article
  8. 48
  9. 49

    Defining Community Food Security by Alison E. Lutz, Mickie E. Swisher, Mark A. Brennan

    Published 2007-07-01
    “…AEC 383/WC064: Defining Community Food Security (ufl.edu) …”
    Get full text
    Article
  10. 50

    On the Security of Certificateless Signature Schemes by Gaurav Sharma, Suman Bala, Anil K. Verma

    Published 2013-06-01
    “…CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53

    Defining Community Food Security by Alison E. Lutz, Mickie E. Swisher, Mark A. Brennan

    Published 2007-07-01
    “…AEC 383/WC064: Defining Community Food Security (ufl.edu) …”
    Get full text
    Article
  14. 54
  15. 55
  16. 56

    An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks by Min Wei, Keecheon Kim

    Published 2016-11-01
    “…In this study, a security testing method based on security levels is proposed for wireless sensor networks. …”
    Get full text
    Article
  17. 57
  18. 58

    On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks by Jun He, Zheng Yang, Jianxun Zhang, Wanping Liu, Chao Liu

    Published 2018-01-01
    “…However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem.…”
    Get full text
    Article
  19. 59

    Perancangan Spesifikasi Keamanan untuk Pengembangan Aplikasi Secure Chat Berdasarkan Common Criteria For It Security Evaluation by Amiruddin Amiruddin, Muhammad Faqih Rohmani

    Published 2021-11-01
    “…This means that security features in some chat applications are developed not based on security specification designs. …”
    Get full text
    Article
  20. 60