Showing 981 - 1,000 results of 9,720 for search '"security"', query time: 0.11s Refine Results
  1. 981
  2. 982
  3. 983
  4. 984

    A data pipeline for secure extraction and sharing of social determinants of health. by Tyler Schappe, Lisa M McElroy, Moronke Ogundolie, Roland Matsouaka, Ursula Rogers, Nrupen A Bhavsar

    Published 2025-01-01
    “…<h4>Discussion and conclusion</h4>We describe a novel pipeline that can facilitate the secure acquisition and sharing of neighborhood-level SDOH without sharing PHI. …”
    Get full text
    Article
  5. 985

    THE NEXUS BETWEEN ARMED CONFLICT, SECURITY, PEACE EDUCATION AND DEVELOPMENT IN NIGERIA by SAMUEL BULUS WADZANI, OGUNDAIRO KAYODE EMMANUEL, AUGUSTINE ECHOBU OGWUCHE

    Published 2023-09-01
    “… This paper examines the interconnection between armed conflict, security, education, peace, and development in Nigeria. …”
    Get full text
    Article
  6. 986
  7. 987

    Constructing RBAC Based Security Model in u-Healthcare Service Platform by Moon Sun Shin, Heung Seok Jeon, Yong Wan Ju, Bum Ju Lee, Seon-Phil Jeong

    Published 2015-01-01
    “…In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. …”
    Get full text
    Article
  8. 988

    Provable security EPC information service communication scheme for EPC network by Jing-feng LI, Heng PAN, Wei-feng GUO

    Published 2013-08-01
    “…To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. …”
    Get full text
    Article
  9. 989
  10. 990

    Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks by Jun-Sub Kim, Jin Kwak

    Published 2014-04-01
    “…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. …”
    Get full text
    Article
  11. 991

    The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking by Xingwang Wang

    Published 2017-01-01
    “…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. In this scenario, security and privacy have become the decisive factors. …”
    Get full text
    Article
  12. 992
  13. 993
  14. 994
  15. 995

    MECHANISMS FOR ENSURING SUSTAINABLE DEVELOPMENT AND FOOD SECURITY OF A SOVEREIGN COUNTRY by N. V. Mayorova, M. K. Mayorov, T. V. Bakhturazova, D. A. Edelev

    Published 2020-05-01
    “…The problems of food security and tasks aimed at preventing internal and external threats, sustainable development of domestic production sufficient to ensure food independence and state sovereignty have been considered.…”
    Get full text
    Article
  16. 996

    Reconstructing a lightweight security protocol in the radio‐frequency identification systems by Alireza Abdellahi Khorasgani, Mahdi Sajadieh, Mohammad Rouhollah Yazdani

    Published 2023-07-01
    “…Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. …”
    Get full text
    Article
  17. 997
  18. 998

    ORGANIZATIONAL - METHODICAL FEATURES OF EVELUATING THE EFFECTIVENESS OF SUSTEMS ECONOMIC SECURITY THE FIRM by M. Vlasenko

    Published 2016-03-01
    “…The study revealed the main methods of ensuring the economic security of the organization, their characteristics and differences from other management techniques. …”
    Get full text
    Article
  19. 999
  20. 1000