Showing 1 - 20 results of 1,772 for search 'security and ability', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Perceived ability to comply with national COVID-19 mitigation strategies and their impact on household finances, food security, and mental well-being of medical and pharmacy students in Liberia. by Elvis J Davis, Gustavo Amorim, Bernice Dahn, Troy D Moon

    Published 2021-01-01
    “…Logistic regression was used to model factors associated with ability to comply with COVID-19 mitigation strategies, as well as participant's food security.…”
    Get full text
    Article
  5. 5

    Human security in the context of unconventional security threats. A theoretical approach by Vasile PAȘCA

    Published 2025-04-01
    “… This article explores the concept of human security in the context of the emergence of a suite of unconventional threats that undermine traditional state-centered security paradigms. …”
    Get full text
    Article
  6. 6

    Quantum secured blockchain framework for enhancing post quantum data security by Nalavala Ramanjaneya Reddy, Supriya Suryadevara, K. Guru Raghavendra Reddy, Ramisetty Umamaheswari, Ramakrishna Guttula, Rajitha Kotoju

    Published 2025-08-01
    “…QKD: The system supports tamper-proof key exchange, quantum-resilient consensus among validator nodes, and secure transaction signing. Experimental evaluation demonstrates that QuantumShield-BC achieves low consensus latency and high throughput, while providing perfect security against simulated attacks from Shor’s and Grover’s algorithms. …”
    Get full text
    Article
  7. 7

    Decentralizing security architecture: evaluating federalism’s role in enhancing security frameworks in Nigeria by O. O. Awotayo, B. O. Omitola

    Published 2024-06-01
    “…The existing centralized security architecture has been found wanting in its ability to effectively mitigates these threats and safeguards the well-being of Nigerian citizens. …”
    Get full text
    Article
  8. 8

    Study on the Heterogeneity of Social Security Affecting the Sense of Security of Urban and Rural Residents by Yuanfeng Liu, Shujiao Luo

    Published 2022-01-01
    “…Change the concept of government management, build a communication platform between the government and the people, and improve residents’ subjective sense of security. We should continue to expand the coverage of the system, promote the coverage of basic social security projects, and improve the ability of urban and rural residents to cope with risks.…”
    Get full text
    Article
  9. 9
  10. 10

    Extension of the basic Global Health Security (GHS) index: Health system security indicator by Živković Živan, Panić Marija

    Published 2021-01-01
    “…This extension of the GHS index provides a more reliable model for predicting the ability of a country's health system to provide an adequate response in a pandemic crisis when human health is seriously endangered. …”
    Get full text
    Article
  11. 11

    Innovation and development of big data ability open platform by Dazhong LI, Jian LIU, Jingwen DENG

    Published 2017-01-01
    “…China Unicom has built a cooperation platform called big data ability open platform based on its own advantages in order to establish a win-win cooperative,coexistent,and sustainable eco-system.The open platform provides variety services in the form of multi-tenancy model for branch companies and partners in aspects of ability access,resource isolation,operation,security,and data services.The open platform satisfies the requirements of internal and external storage capacity and computing ability,data services,and platform tools,thus brings enormous benefits to China Unicom Headquarters.…”
    Get full text
    Article
  12. 12

    FOOD SECURITY: ESSENCE OF THE NOTION by Vera A. Tikhomirova

    Published 2017-09-01
    “…The author discloses the essence of such notions as 'security', 'national security', 'food security'. The author provides interpretation of the term 'food security' as ability of the country irrespective of international situation to provide all layers of the population with an access to safe, high- quality food in the amount necessary for active and healthy life without cutting state food reserves.…”
    Get full text
    Article
  13. 13

    FOOD SECURITY: TOPICALITY FOR RUSSIA by G. V. Podbiralina, T. E. Migaleva, A. V. Ryzhakova, N. Р. Savina

    Published 2018-06-01
    “…It is stipulated mainly by the fact that food security standing shows the ability of the agro-industrial complex to provide the population with foods and at the same time to support the balanced and optimal correlation between home production and imported food. …”
    Get full text
    Article
  14. 14

    Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT by Kisung Park, Myeonghyun Kim, Youngho Park

    Published 2025-01-01
    “…The previous work in “Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT” proposed a novel AKA scheme for secure IoT environments. …”
    Get full text
    Article
  15. 15
  16. 16

    Provable secure digital watermarking scheme

    Published 2008-01-01
    “…A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency.…”
    Get full text
    Article
  17. 17

    Provable secure digital watermarking scheme

    Published 2008-01-01
    “…A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency.…”
    Get full text
    Article
  18. 18

    Operationalisation of the European Union security policy by Orlić Dejan

    Published 2006-01-01
    “…From the creation and adoption of the European Security Strategy, the European Union has made several specific steps in the development of the European Security and Defense Policy. …”
    Get full text
    Article
  19. 19

    Construction of Intensive Security Domain Protection System for Service Platform——Discussion of Security Domain Division and Boundary Integration by Xianyi Qiu, Hong Li

    Published 2013-08-01
    “…With the continuous expansion of network scale and the development of service platform,how to improve the safety protection ability of service platform has become the focus of communication network operation and maintenance for telecom operators,in order to achieve the effective and intensive protection of service platforms,the most effective way is security domain division and boundary integration.Reference to the maintenance of China Telecom service platforms and the experience of the industry,the method of security domain division and the boundary integration was analyzed,and the construction of a intensive security domain division system for service platform was discussed.…”
    Get full text
    Article
  20. 20

    Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach by Musaad Alruwaili, Junghwan Kim, Jared Oluoch

    Published 2025-01-01
    “…We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. …”
    Get full text
    Article