Results 41 to 50 of about 6,929,434 (416)

On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, Volume 12, Issue 4 (2015), pp. 485 - 490, 2014
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the ...
arxiv   +1 more source

Impact of climate change on biodiversity and food security: a global perspective—a review article

open access: yesAgriculture & Food Security, 2021
Climate change is happening due to natural factors and human activities. It expressively alters biodiversity, agricultural production, and food security. Mainly, narrowly adapted and endemic species are under extinction.
Melese Genete Muluneh
semanticscholar   +1 more source

Computer security and security technologies [PDF]

open access: yesJournal of Process Management. New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Dragan Velickovic, Lazar Stošić
openaire   +2 more sources

On the Security of Security Software

open access: yesElectronic Notes in Theoretical Computer Science, 2006
Currently, security appears to be one of the strongest sales arguments for software vendors all over the world. No other sector of the software industry has undergone a similar wave of mergers and acquisitions recently as the producers of security software. Market analyses from all leading business consultants predict heavy growth in the field, and the
openaire   +1 more source

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

The Transport Layer Security (TLS) Protocol Version 1.3

open access: yesRequest for Comments, 2008
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet.
E. Rescorla
semanticscholar   +1 more source

Ureteral tumor in an ectopic duplex system: a case report

open access: yesJournal of Medical Case Reports, 2019
Introduction Ureteral ectopia is a rarely observed anomaly. It may be totally asymptomatic. An association with a duplex system is exceptional. Diagnostic and therapeutic approaches are challenging. Carcinologic surgery must consider the anatomic variant,
Omar Karray   +11 more
doaj   +1 more source

Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification

open access: yesSensors, 2023
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin   +4 more
doaj   +1 more source

The SmartAG partner: CCAFS East Africa Bi-Annual Newsletter, July - December 2019 [PDF]

open access: yes, 2020
We are pleased to share with you our SmartAg Partner bi-annual newsletter, highlighting policy engagement, ongoing research, field updates and activities with partners from the second half of ...
CGIAR Research Program on Climate Change, Agriculture and Food Security
core  

The power of microRNA regulation—insights into immunity and metabolism

open access: yesFEBS Letters, EarlyView.
MicroRNAs are emerging as crucial regulators at the intersection of metabolism and immunity. This review examines how miRNAs coordinate glucose and lipid metabolism while simultaneously modulating T‐cell development and immune responses. Moreover, it highlights how cutting‐edge artificial intelligence applications can identify miRNA biomarkers ...
Stefania Oliveto   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy