Showing 761 - 780 results of 5,943 for search '"security"', query time: 0.11s Refine Results
  1. 761

    Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices by Antonio Puliafito, Antonio Celesti, Massimo Villari, Maria Fazio

    Published 2015-12-01
    “…The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue. …”
    Get full text
    Article
  2. 762

    Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique by Nithya Chidambaram, Pethuru Raj, K. Thenmozhi, Rengarajan Amirtharajan

    Published 2016-01-01
    “…The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. …”
    Get full text
    Article
  3. 763
  4. 764

    Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans by N.G.N. Renti Maharaini Kerti

    Published 2024-10-01
    Subjects: “…personal data security, online lending, consumer protection, financial services authority, legal certainty…”
    Get full text
    Article
  5. 765

    Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model by Shariq Hussain, Haris Anwaar, Kashif Sultan, Umar Mahmud, Sherjeel Farooqui, Tehmina Karamat, Ibrahima Kalil Toure

    Published 2024-01-01
    “…For the past few years, software security has become a pressing issue that needs to be addressed during software development. …”
    Get full text
    Article
  6. 766
  7. 767
  8. 768
  9. 769
  10. 770
  11. 771

    Water insecurity is human: why social science must be at the core of water security research and practice by Amber Wutich

    Published 2025-01-01
    “…To address this, the emerging science of water security can build on well-established and theoretically-robust findings from social science. …”
    Get full text
    Article
  12. 772

    Assessing the role of local councils in the development of sustainable urban security (Case Study; Urmia City) by Parvin Daneshvar, Taghiloo Ali Akbar, Hassan heydari

    Published 2023-06-01
    “…Conclusions: Based on the Friedman test, among the research items, the second item is "Social Security Development", and the first item is "Economic Security Development". …”
    Get full text
    Article
  13. 773

    The role of international support programmes in global health security capacity building: A scoping review. by Anne Doble, Zoe Sheridan, Ahmed Razavi, Anne Wilson, Ebere Okereke

    Published 2023-01-01
    “…Large scale public health emergencies such as COVID-19 demonstrate the importance of Global Health Security (GHS) and highlight the necessity of resilient public health systems capable of preparing for, detecting, managing, and recovering from such emergencies. …”
    Get full text
    Article
  14. 774

    THE RELATIONSHIP OF WOMEN WORKERS WITH DEVELOPMENT FROM THE PERSPECTIVE OF GAINING THEIR ECONOMIC FREEDOM AND SECURING THE FUTURE OF THEIR CHILDREN by Bediha Şahin

    Published 2023-03-01
    “…According to the results of the research, it has been detected that the participating women workers entered business life due to compulsory reasons, gained their economic freedom and stood on their own feet, it was effective that they worked to secure the future of their children and earned money, that they loved their job very much and were satisfied with their work. …”
    Get full text
    Article
  15. 775
  16. 776
  17. 777

    Enhanced airport security screening under fermatean probabilistic hesitant fuzzy hybrid aggregation information by Wania Iqba, Shahziab Ashraf, Maria Akram, Muhammad Shazib Hameed

    Published 2024-06-01
    “…Optimizing airport security screening processes is imperative in the modern age, ensuring a delicate balance between stringent security measures and efficient, seamless travel experiences for passengers. …”
    Get full text
    Article
  18. 778
  19. 779

    Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks by Yang Lu, Jiguo Li

    Published 2014-01-01
    “…In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. …”
    Get full text
    Article
  20. 780

    Clinical Application of Inferior Alveolar Nerve Block Device for Safe and Secure IANB by Any Operator by Tomoyasu Noguchi, Kento Odaka, Ken-ichi Fukuda

    Published 2023-01-01
    “…Nevertheless, it is a useful technique for pain control, and a secure IANB offers significant benefits to operators and patients. …”
    Get full text
    Article