Showing 1,521 - 1,540 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1521
  2. 1522

    Memahami Dinamika Kerjasama Industri Pertahanan dalam Kerangka Indonesia Australia Defence Security Dialogue by Arfin Sudirman, Yusa Djuyandi, Fajri Syahal Guna Pratama

    Published 2023-01-01
    “…Industri pertahanan menjadi salah satu agenda penting dan menjadi perhatian, dimulai pada saat kabinet Indonesia Bersatu I dibawah Presiden Susilo Bambang Yudhoyono dan menjadikannya sebagai prioritas pembangunan dan memberi peluang besar bagi keterlibatan pihak swasta dalam kegiatan industri pertahanan salah satunya melalui agenda kerja sama yang dijalin oleh Indonesia dengan Australia dalam satu agenda dialog Indonesia – Australia Defense Security Dialogue (IADSD) yang telah dijalin dan disahkan oleh Lombok Treaty pada tahun 2006, yang mana Indonesia dalam hal ini memiliki kepentingan untuk meningkatkan kapabilitas serta kemandirian Industri pertahanan nasional. …”
    Get full text
    Article
  3. 1523

    Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network by Yinghui ZHANG, Lingyun HU, Yixin LI, Jianting NING, Dong ZHENG

    Published 2022-04-01
    “…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
    Get full text
    Article
  4. 1524
  5. 1525
  6. 1526

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents by Hui He, Guotao Fan, Jianwei Ye, Weizhe Zhang

    Published 2013-01-01
    “…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
    Get full text
    Article
  7. 1527

    A security detection approach based on autonomy-oriented user sensor in social recommendation network by Shanshan Wan, Ying Liu

    Published 2022-03-01
    “…However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. …”
    Get full text
    Article
  8. 1528

    Assessing Structural Components of Investment and Innovation Provision of Economic Security in the Basic Types of Economic Activity by Ruslan Kolishenko, Olya Ilyash, Ruslan Lupak, Iryna Dzhadan

    Published 2021-06-01
    “…The article shows the progressive and practical value of a structural approach to the evaluation of investment and innovation provision of economic security, including the basic types of economic activity. …”
    Get full text
    Article
  9. 1529

    Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices by Antonio Puliafito, Antonio Celesti, Massimo Villari, Maria Fazio

    Published 2015-12-01
    “…The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue. …”
    Get full text
    Article
  10. 1530
  11. 1531

    Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique by Nithya Chidambaram, Pethuru Raj, K. Thenmozhi, Rengarajan Amirtharajan

    Published 2016-01-01
    “…The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. …”
    Get full text
    Article
  12. 1532
  13. 1533
  14. 1534
  15. 1535

    Personal data security as a form of legal certainty for the fulfillment of consumer rights for online loans by N.G.N. Renti Maharaini Kerti

    Published 2024-10-01
    Subjects: “…personal data security, online lending, consumer protection, financial services authority, legal certainty…”
    Get full text
    Article
  16. 1536

    Farmers-Herders Conflict and Nigeria’s Quest for Food Security: The Imperative Need for Information Communications Technology by Olawale Olufemi Akinrinde, Abdullahi Abdullazeez Osuwa, Kayode Wakili Olawoyin

    Published 2021-12-01
    “…In recent times, many scholarly studies and inquiries on the impact of Information Communications Technology, particularly with respect to promoting food security in Nigeria, have been engendered mainly by the need to ensure greater agricultural outputs among farmers and other agriculturists. …”
    Get full text
    Article
  17. 1537

    Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model by Shariq Hussain, Haris Anwaar, Kashif Sultan, Umar Mahmud, Sherjeel Farooqui, Tehmina Karamat, Ibrahima Kalil Toure

    Published 2024-01-01
    “…For the past few years, software security has become a pressing issue that needs to be addressed during software development. …”
    Get full text
    Article
  18. 1538
  19. 1539
  20. 1540