Showing 1,401 - 1,420 results of 9,720 for search '"security"', query time: 0.11s Refine Results
  1. 1401

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  2. 1402

    Distributed key sharing based scheme for security clustering in unattended wireless sensor network by HONGHong Z, HANGQing-yang Z, IANLi-chao T, ANGLiang-min W

    Published 2015-05-01
    “…For unattended wireless sensor network (UWSN),considering the collecting and efficiency and security prob-lems,a secure clustering scheme for UWSN was proposed,which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity,balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm,in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes,and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing,and more than 95% attacks are tol-erated when compromised nodes are less than 20%.…”
    Get full text
    Article
  3. 1403

    South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions by Nawal Omar, Scott Timcke

    Published 2024-12-01
    Subjects: “…elections, voters, technology, mobile apps, data privacy, data security, South Africa, Electoral Commission, IEC…”
    Get full text
    Article
  4. 1404

    A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography by Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye

    Published 2021-01-01
    “…Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. …”
    Get full text
    Article
  5. 1405
  6. 1406

    Pre-authentication and group management based secure handover for space-earth integration network by Jia-nan HONG, Shao-hua LI, Kai-ping XUE, Pei-lin HONG

    Published 2016-07-01
    “…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
    Get full text
    Article
  7. 1407

    An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era by Isaac Moses Kisembo, Gilbert Gilibrays Ocen, Ocident Bongomin, Andrew Egwar Alunyu, Ildephonse Nibikora, Davis Matovu, Felix Bwire

    Published 2021-01-01
    “…With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. …”
    Get full text
    Article
  8. 1408
  9. 1409

    Approach for information systems security situation evaluation using improved FAHP and Bayesian network by FU Yu, WU Xiao-ping, YE Qing

    Published 2009-01-01
    “…An approach for the information systems security situation assessment based on an improved FAHP and Bayesian network was proposed to solve the problem of obtaining the risk grade.The improved FAHP was used to quantify the factor of attack severity which was hard to scale.Simultaneously, the conditional probability matrices for all fac-tors were defined with the expert knowledge.Then a model for information security situation assessment was established by the Bayesian network inference, and the corresponding approach was presented.Finally, an illustrative instance was given to demonstrate its rationality and feasibility.Thus it may provide a new way for assessing information systems security situation.…”
    Get full text
    Article
  10. 1410

    A hybrid blockchain-based solution for secure sharing of electronic medical record data by Gang Han, Yan Ma, Zhongliang Zhang, Yuxin Wang

    Published 2025-01-01
    “…Patient privacy data security is a pivotal area of research within the burgeoning field of smart healthcare. …”
    Get full text
    Article
  11. 1411
  12. 1412

    Provably secure biometric and PUF-based authentication for roaming service in global mobility network by E. Haodudin Nurkifli

    Published 2025-02-01
    “…However, while GLOMONET offers numerous benefits, it also present security challenges that need to be addressed. To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
    Get full text
    Article
  13. 1413

    Britain’s Indo-Pacific Security and Trade Policies: Continuity and Change Under the Labour Government by Samir PURI

    Published 2024-12-01
    “…The United Kingdom’s main motivation for its engagement in the Indo-Pacific is commercial, alongside its contributions to regional security. In July 2024, a Labour government replaced the Conservative government. …”
    Get full text
    Article
  14. 1414
  15. 1415

    A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network by Sana Ullah, Muhammad Imran, Mohammed Alnuem

    Published 2014-02-01
    “…In addition, a set of security keys is used to prevent illegal access to the network. …”
    Get full text
    Article
  16. 1416

    Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization by Khandakar Md Shafin, Saha Reno

    Published 2024-01-01
    “…The ongoing challenge in the world of blockchain technology is finding a solution to the trilemma that involves balancing decentralization, security, and scalability. This paper introduces a pioneering blockchain architecture designed to transcend this trilemma, uniting advanced cryptographic methods, inventive security protocols, and dynamic decentralization mechanisms. …”
    Get full text
    Article
  17. 1417

    2D Sin-Cos-Henon Map for Color Image Encryption with High Security by Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li

    Published 2022-01-01
    “…In this paper, a high security color image encryption algorithm is proposed by 2D Sin-Cos-Hénon (2D-SCH) system. …”
    Get full text
    Article
  18. 1418
  19. 1419
  20. 1420