Showing 941 - 960 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 941
  2. 942
  3. 943
  4. 944

    Digital economic security of Russian organizations, industries and Russia as a whole by S. A. Antonov, A. V. Savchenko, O. G. Kazeeva

    Published 2019-09-01
    Subjects: “…digital economic security of the organization…”
    Get full text
    Article
  5. 945

    STBM: secure and trustworthy blockchain-based model for cybersecurity service transactions by PIAO Guirong, ZHU Jianming

    Published 2024-09-01
    “…To overcome the numerous challenges faced by traditional models of cybersecurity service transactions, adapt to the needs of industrial digitalization, and address the inconveniences and opacity of cybersecurity service transactions, a secure and trustworthy blockchain-based model for cybersecurity service transactions was proposed, which could provide a secure, efficient, and controllable means of transaction for cybersecurity services. …”
    Get full text
    Article
  6. 946
  7. 947

    Proven secure blind adaptor signature scheme based on the SM2 by HU Xiaoming, CHEN Haichan

    Published 2024-04-01
    “…The security of this new scheme, which was founded on the unforgeability and the hardness of the SM2 signature scheme, was demonstrated to meet the requirements of the newly proposed security model. …”
    Get full text
    Article
  8. 948

    Foreign terrorist fighters as a potential security problem of the Republic of Serbia by Đorić Marija, Obrenović Strahinja

    Published 2024-01-01
    “…The paper analyzes the phenomenon of foreign terrorist fighters, who can represent a potential security problem for the Republic of Serbia. It is believed that in the period from 2012 to 2016, more than 1,200 people from the Western Balkan region (including Serbia, as well). …”
    Get full text
    Article
  9. 949
  10. 950
  11. 951
  12. 952

    Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection by Yu’e Jiang, Jiaxiang Liu

    Published 2017-01-01
    “…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
    Get full text
    Article
  13. 953

    Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results by S. Krut, Ch. Azevedo Coste, P. Chabloz

    Published 2011-01-01
    “…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
    Get full text
    Article
  14. 954
  15. 955
  16. 956
  17. 957
  18. 958
  19. 959
  20. 960

    New construction of secure range query on encrypted data in cloud computing by Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, Ru-chuan WANG

    Published 2015-02-01
    “…To solve the information leakage problem resulting from several assertions of previous range query solutions,there is a secure range query scheme with one assertion (SRQSAE scheme),and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented,and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword,and it achieves high level needs of security without losing efficiency.…”
    Get full text
    Article