Showing 801 - 820 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 801

    The Relationship between Russian Identity and Political Polarization: The Role of Secure National Identification and National Narcissism by O.A. Gulevich, S.S. Kosimova

    Published 2025-01-01
    “…</strong>To analyse the relationship between secure national identification and national narcissism with political polarization (intergroup differentiation between people with different political views). …”
    Get full text
    Article
  2. 802
  3. 803

    An Efficient and Hybrid Deep Learning-Driven Model to Enhance Security and Performance of Healthcare Internet of Things by Muhammad Babar, Muhammad Usman Tariq, Basit Qureshi, Zabeeh Ullah, Fahim Arif, Zahid Khan

    Published 2025-01-01
    “…However, H-IoT devices present security and Quality of Service (QoS) concerns because of their critical nature, complexity, and dynamic features, which make them incompatible with conventional network topologies. …”
    Get full text
    Article
  4. 804

    Industrial Pipe-Rack Health Monitoring System Based on Reliable-Secure Wireless Sensor Network by Jong-Han Lee, Ji-Eun Jung, Nam-Gyu Kim, Byung-Hun Song

    Published 2012-10-01
    “…However, for the application of WSN technology in large-scale industrial plants, issues of reliability and security should be fully addressed, and an industrial sensor network standard that mitigatesthe problem of compatibilitywith legacy equipment and systems should be established. …”
    Get full text
    Article
  5. 805

    Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer by Hehao Niu, Bangning Zhang, Daoxing Guo, Mingyue Lu

    Published 2017-06-01
    “…In this article, we investigate the physical layer security problem in relay wireless sensor networks with simultaneous wireless information and power transfer. …”
    Get full text
    Article
  6. 806

    Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid by Sergio Saponara, Tony Bacchillone

    Published 2012-01-01
    “…This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. …”
    Get full text
    Article
  7. 807
  8. 808

    INFLUENCE OF SECURITY CHALLENGES ON STUDENT ACADEMIC PERFORMANCE IN COLLEGE OF EDUCATION BILLIRI, GOMBE STATE, NIGERIA by MOHAMMED ABUBAKAR SABO, YAKUBU MUHAMMAD BELLO, MUHAMMAD AUWAL

    Published 2024-06-01
    “…The major recommendations by the researchers are the management of the college are to invest in advanced and reliable security equipment, ensure the presence of adequately trained security personnel and implement comprehensive and effective security policies and procedures and establish counseling and psychological support services to help students manage stress and anxiety related to insecurity. …”
    Get full text
    Article
  9. 809

    Determinants of Rural Household Food Security Status in North Shewa Zone, Amhara Region, Ethiopia by Abebaw Hailu Fikire, Mesele Belay Zegeye

    Published 2022-01-01
    “…This paper used the calorie intake method per day to measure household food security status and a logit model to investigate the determinants of food security. …”
    Get full text
    Article
  10. 810

    A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things by Yong Shen, Xiaokang Tang, Xiang Zhang, Yongzhuang Zhou, Hongxin Zou

    Published 2022-11-01
    “…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. …”
    Get full text
    Article
  11. 811
  12. 812
  13. 813
  14. 814
  15. 815
  16. 816

    Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols by Ang Yang, Junghyun Nam, Moonseong Kim, Kim-Kwang Raymond Choo

    Published 2014-01-01
    “…Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. …”
    Get full text
    Article
  17. 817
  18. 818
  19. 819
  20. 820