Showing 441 - 460 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 441
  2. 442
  3. 443
  4. 444
  5. 445
  6. 446
  7. 447

    Security of the deployment of SDN-based IoT using blockchain by Ping XIE, Xiaosong LIU

    Published 2020-12-01
    Subjects: “…network security…”
    Get full text
    Article
  8. 448
  9. 449
  10. 450
  11. 451

    Robust image hiding algorithm for secure multimodal biometrics by Yu-qiang CAO, Wei-guo GONG, Sen BAI

    Published 2016-09-01
    “…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
    Get full text
    Article
  12. 452

    A Novel FM-DCSK Secure Communication System by Gang Zhang, Yuan Wang, Ying Wang

    Published 2015-01-01
    Subjects: “…chaos secure communication…”
    Get full text
    Article
  13. 453
  14. 454
  15. 455

    Secure cross-domain communication mechanism for Web mashups by Jian-hua SUN, Zhi-rong LIU, Hao CHEN

    Published 2012-06-01
    “…Many methods were used in cross-domain communication,whereas they were hardly to meet the security and high performance requirements.To this end,a secure cross-domain communication(SCDC)mechanism was proposed for Web mashups.It encapsulates content from different trust domains as secure components,achieves cross-domain communication with layered communication stack,and shares fine-grained objects by wrapping objects.SCDC mechanism supports secure cross-domain communication,shares objects between mashups and components without any browser modifications.Experiments show that the mechanism improves the communication efficiency more than five-fold,and only incurs limited overhead.…”
    Get full text
    Article
  16. 456
  17. 457
  18. 458
  19. 459

    Research of public infrastructure system and security policy in cyberspace by Jie QIU, Rui HAN, Zhifeng WEI, Zhiyang WANG

    Published 2021-12-01
    “…Considering the key elements, such as object, resources, activities, and other equipment, as same as system, data, environmental and other aspects of demand, the public infrastructure system and security policy between physical space and cyberspace were taken as a basic point.A scientific system of public infrastructure in cyberspace was constructed.From the perspective of dual authentication of management authentication and application authentication, some corresponding safety policies and implementation suggestions were given from the aspects of user/device management and identity authentication.…”
    Get full text
    Article
  20. 460

    Sustainable intensification of agriculture: the foundation for universal food security by Glenn Denning

    Published 2025-01-01
    “…To achieve universal food security, SI must be accompanied by complementary investments in market infrastructure, postharvest stewardship, healthy diets, and social protection. …”
    Get full text
    Article