Printer Friendly

Browse Investment analysis topic

Safety and security measures subtopic


1-59 out of 59 article(s)
Title Author Type Date Words
Secure Municipal Internet Of Things Infrastructures (smioti). Aug 9, 2019 230
Elaborating A Security Analysis Analysis. Jul 15, 2019 131
Diagnosis And Pyrotechnic Security For The 3 Rd Underground Line Project. Jul 5, 2019 261
Diagnosis And Pyrotechnic Safety For The 3rd Metro Project Reference Number: M3 2019 13959 M. Jul 4, 2019 254
Under GDPR, you can still get security data. Jun 10, 2019 771
Retractable Needle Safety Syringes Market Asia Pacific Industry Analysis, Size, Share, Growth, Trend. May 26, 2019 805
Retractable Needle Safety Syringes Market Asia Pacific Industry Analysis, Size, Share, Growth, Trend. May 24, 2019 818
Retractable Needle Safety Syringes Market Asia Pacific Industry Analysis, Size, Share, Growth, Trend. May 24, 2019 805
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. Yin, Hongjian; Zhang, Leyou; Cui, Yilei May 1, 2019 6109
Supply Of Equipment For Securing The Network Of The Contracting Authority, Ie. Next-gen Firewall Security Gateways. Mar 12, 2019 217
A Relay-assisted Secure Handover Mechanism for High-speed Trains. Zhao, Yue; Tian, Bo; Chen, Zhouguo; Yang, Jin; Li, Saifei Report Feb 1, 2019 6364
On Backlash: Emotion and the Politicisation of Security. Van Rythoven, Eric Dec 22, 2018 10500
Project 351: Security Analysis Veracrypt. Dec 14, 2018 212
Private Blockchain-Based Secure Access Control for Smart Home Systems. Xue, Jingting; Xu, Chunxiang; Zhang, Yuan Report Dec 1, 2018 9431
United States : Expanded Machine Safety Portfolio Optimizes Safety System Performance. Nov 17, 2018 427
Performance Security Analysis Of An Operational Information Security Center. Nov 13, 2018 109
Texas Lt. Gov. Dan Patrick says he will donate metal detectors to Santa Fe ISD after school shooting. Jul 2, 2018 561
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. Li, Wei; Ge, Chenyu; Gu, Dawu; Liao, Linfeng; Gao, Zhiyong; Shi, Xiujin; Lu, Ting; Liu, Ya; Liu, Zhi Report Jul 1, 2018 7277
Procurement Of Equipment And Associated Services For Setting Up Of A Security Analysis Centre (sac). May 21, 2018 259
Ac Framework Agreement Expertise And Security Projects. May 10, 2018 115
Provision By The Contractor To The Epo Of It Security And System Quality Assessment Services - Upon Commissioning By The Epo. this Open Invitation To Tender Will Result In A Guaranteed Total Contract Volume Of: 1600 Working Days For Lot 1: Security. May 9, 2018 146
System Integrator (si)/Service Provider (sp) For Participating In A Tender Floated By A Strategic Customerfor Procurement Of Equipment And Associated Servicesfor Setting Up Of Security Analysis Centre (sac) Atcustomer Sites Across India. Apr 23, 2018 196
Procurement Of Equipment And Associated Services For Setting Up Of A Security Analysis Centre (sac). Apr 22, 2018 240
Non-exclusive Right To Use The Security Analysis Tool (sans) For 1 Year. Apr 22, 2018 155
Performance Analysis of SAP-NFC Protocol. Al-Fayoumi, Mustafa; Nashwan, Shadi Report Apr 1, 2018 4676
Barr Group's 2018 Embedded Systems Safety & Security Survey Reveals an "Internet of Insecure Things". Feb 23, 2018 750
Multiperiod Telser's Safety-First Portfolio Selection with Regime Switching. Lin, Chuangwei; Wu, Huiling Jan 1, 2018 9095
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. Wang, Chen; Shen, Jian; Liu, Qi; Ren, Yongjun; Li, Tong Jan 1, 2018 4977
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing. Xuan, Shichang; Man, Dapeng; Zhang, Jiangchuan; Yang, Wu; Yu, Miao Jan 1, 2018 9198
Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System. Mao, Deming; Zhang, Ling; Li, Xiaoyu; Mu, Dejun Jan 1, 2018 12752
Quantum Cryptography for the Future Internet and the Security Analysis. Zhou, Tianqi; Shen, Jian; Li, Xiong; Wang, Chen; Shen, Jun Jan 1, 2018 4247
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. Wang, Xin; Yang, Bo; Xia, Zhe; Zhao, Yanqi; Yu, Huifang Jan 1, 2018 9168
A Secure and Scalable Data Communication Scheme in Smart Grids. Hu, Chunqiang; Liu, Hang; Ma, Liran; Huo, Yan; Alrawais, Arwa; Li, Xiuhua; Li, Hong; Xiong, Qingyu Report Jan 1, 2018 13006
A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate. Chen, Zhonglin; Chen, Shanzhi; Xu, Hui; Hu, Bo Jan 1, 2018 6984
Kobiton, App-Ray partnership improves security of mobile apps. Dec 14, 2017 316
Kobiton, App-Ray partnership improves security of mobile apps. Dec 14, 2017 304
Kobiton, App-Ray partnership improves security of mobile apps. Dec 14, 2017 316
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy. Yu, Haiyang; Cai, Yongquan; Kong, Shanshan; Ning, Zhenhu; Xue, Fei; Zhong, Han Report Oct 1, 2017 9318
Improving security in mobile network access using screen brightness and symbols. Sherly, S. Irin; Abirami, K.; Amoka, M.; Kalaivani, T.E. May 1, 2017 3470
Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map. Zhao, Jian-Feng; Wang, Shu-Ying; Zhang, Li-Tao; Wang, Xiao-Yan Jan 1, 2017 3816
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP. Ibrahim, Alaauldin; Dalkilic, Gokhan Jan 1, 2017 6936
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016. Yu, Fei; Chang, Chin-Chen; Shu, Jian; Ahmad, Iftikhar; Zhang, Jun; de Fuentes, Jose Maria Jan 1, 2017 1932
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. Wu, Fusheng; Zhang, Huanguo; Wang, Wengqing; Jia, Jianwei; Yuan, Shi Report Jan 1, 2017 9727
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing. Hussain, Mohammed Abdulridha; Jin, Hai; Hussien, Zaid Alaa; Abduljabbar, Zaid Ameen; Abbdal, Salah H Report Jan 1, 2017 10407
United Kingdom : IACR releases paper on Signal's security audit. Nov 9, 2016 246
Boko Haram Terrorism in the Lake Chad Basin Region: Implications for Subregional Security. Oluwadare, Abiodun Joseph Essay Nov 1, 2016 8019
QCRI project to define techniques to determine cyber threats against Qatar. Oct 2, 2016 599
Security Analysis Equipment (microwave), Submission Of Quotations Can Purchase Small Advertisements. Aug 21, 2016 123
Security analysis. Feb 19, 2016 104
A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rossler Map. Abundiz-Perez, F.; Cruz-Hernandez, C.; Murillo-Escobar, M.A.; Lopez-Gutierrez, R.M.; Arellano-Delgad Report Jan 1, 2016 6227
Secret Image Sharing Scheme with Threshold Changeable Capability. Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Hu, Weitong; Luo, Xinjian Jan 1, 2016 8348
Provision Of Campus Security Analysis and Consultation. Dec 10, 2015 460
Samsung Galaxy S6 Security Flaws Revealed. Nov 4, 2015 278
Security analysis and enhancements of a three-party authenticated key agreement protocol/Analise de seguranca e realce de um protocolo de consenso de chave autenticada por um conjunto de tres pessoas. Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo Jul 1, 2015 5297
Security analysis and evaluation of random linear network coding under wiretapping attack. Xiaoxing, L.V.; Baihai, Zhang Report Dec 1, 2013 3307
Algorithm of investment safety ranking assessment: threats analysis. Kharlamova, Ganna Dec 1, 2013 5438
A secure and efficient authentication protocol for mobile RFID systems. Sandhya, M.; Rangaswamy, T.R. Report Jun 1, 2011 5867
Brown to keep politics out of security analysis; BRITAIN. Jun 12, 2007 521

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters