Showing 1,181 - 1,200 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1181
  2. 1182

    Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim

    Published 2020-01-01
    “…Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. …”
    Get full text
    Article
  3. 1183

    Investigating the security consequences of climate change on Iran with a Good Governance approach by Parisa ghorbani sepehr, Zaki Yashar, Seyed abbas ahmadi

    Published 2024-12-01
    “…Due to its location in low latitudes, Iran is among the countries that has not been spared from the security consequences of climate change. The present study seeks to answer two questions: 1) What are the security consequences of climate change on Iran and which components have the greatest impact on Iran? …”
    Get full text
    Article
  4. 1184
  5. 1185
  6. 1186

    Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency by G. S. Nagaraja, K. Vanishree, Farooque Azam

    Published 2023-01-01
    “…Energy-efficient data transmission in PA via sensing technology is possible only when additional security measures are synchronized. Nevertheless, security considerations often introduce additional overhead. …”
    Get full text
    Article
  7. 1187

    A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature by Y. P. Jiang, C. C. Cao, X. Mei, H. Guo

    Published 2016-01-01
    “…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
    Get full text
    Article
  8. 1188
  9. 1189

    APPROACH TO ECONOMIC SECURITY ORGANIZATION BASED ON PROBLEM-SOLVING TYPE CLOSED CIRCLE by A. Savin

    Published 2016-07-01
    Subjects: “…economic security of organization…”
    Get full text
    Article
  10. 1190
  11. 1191
  12. 1192
  13. 1193
  14. 1194
  15. 1195

    Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users by Vanga Anil, S. L. Arun

    Published 2025-01-01
    “…However, TES is facing critical challenges in security and economics. Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
    Get full text
    Article
  16. 1196

    Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key by Xincheng YAN, Yue CHEN, Hongyong JIA, Yanru CHEN, Xinyue ZHANG

    Published 2018-05-01
    “…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
    Get full text
    Article
  17. 1197
  18. 1198
  19. 1199

    Secure Two-Party Decision Tree Classification Based on Function Secret Sharing by Kun Liu, Chunming Tang

    Published 2023-01-01
    “…This paper proposes a novel framework for secure two-party decision tree classification that enables collaborative training and evaluation without leaking sensitive data. …”
    Get full text
    Article
  20. 1200