Journal articles on the topic 'Key Fob Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Key Fob Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
IJRAME, Journal. "Vehicle unlocking system using Key Fob with Fingerprint." International Journal of Research in Aeronautical and Mechanical Engineering 13, no. 5 (2025): 34–45. https://doi.org/10.5281/zenodo.15496160.
Full textIsa, Mohd Anuar Mat, Habibah Hashim, Syed Farid Syed Adnan, Nur Nabila Mohamed, and Yasin Fitri Alias. "Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 2 (2018): 688. http://dx.doi.org/10.11591/ijeecs.v11.i2.pp688-695.
Full textMohd, Anuar Mat Isa, Hashim Habibah, Farid Syed Adnan Syed, Nabila Mohamed Nur, and Fitri Alias Yasin. "Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 2 (2018): 688–95. https://doi.org/10.11591/ijeecs.v11.i2.pp688-695.
Full textIbrahim, Dasam Sunday, and Prof Mutiullah Olasupo. "The Nigerian Military Operation Safe Haven (OPSH) Operation in Internal Security Management in Plateau State: Challenges and Prospects." JOURNAL OF POLITICAL SCIENCE AND LEADERSHIP RESEARCH 9, no. 1 (2023): 10–24. http://dx.doi.org/10.56201/jpslr.v9.no1.2023.pg10.24.
Full textHeatherly, Raymond. "Privacy and Security within Biobanking: The Role of Information Technology." Journal of Law, Medicine & Ethics 44, no. 1 (2016): 156–60. http://dx.doi.org/10.1177/1073110516644206.
Full textM J, Pavithra, Poornima M, and Nirmala Nirmala. "Raspberry Pi-based Facial Recognition for Vehicle Access Control." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–9. https://doi.org/10.55041/ijsrem40261.
Full textPatil, Tushar Anil, and Prof Dr Mrs K. V. Kulhalli. "Symmetric Key Cryptography Algorithm for Data Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (2018): 586–89. http://dx.doi.org/10.31142/ijtsrd9444.
Full textFengwei Cheng, Fengwei Cheng, Sai Ji Fengwei Cheng, and Chin-Feng Lai Sai Ji. "Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing." 網際網路技術學刊 23, no. 7 (2022): 1461–71. http://dx.doi.org/10.53106/160792642022122307002.
Full textHao Yan, Hao Yan, Yanan Liu Hao Yan, Dandan Huang Yanan Liu, Shuo Qiu Dandan Huang, and Zheng Zhang Shuo Qiu. "Public Integrity Verification for Cloud Storage with Efficient Key-update." 網際網路技術學刊 24, no. 6 (2023): 1263–71. http://dx.doi.org/10.53106/160792642023112406009.
Full textMelnyk, Viktor. "Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem." Advances in Cyber-Physical Systems 4, no. 1 (2019): 42–54. http://dx.doi.org/10.23939/acps2019.01.042.
Full textIn-Ho Lee, In-Ho Lee, and Myungjin Cho Myungjin Cho. "Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data." Chinese Optics Letters 13, no. 1 (2015): 010603–10607. http://dx.doi.org/10.3788/col201513.010603.
Full textElamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.
Full textRabari, Dipak K., Yogesh K. Meghrajani, and Laxmi S. Desai. "Lock and Key Share Secret Sharing Scheme with Meaningful Shares for Grayscale Image and Color Image." Indian Journal Of Science And Technology 17, no. 42 (2024): 4405–14. http://dx.doi.org/10.17485/ijst/v17i42.2486.
Full textVinnarasi, J., and D. I. George Amalarethinam. "Advancing Data Security in Cloud Computing: Introducing Secured Layered Technique for Data Security Approach (SLT-DSA), A Multi-Layered Security Framework." Indian Journal Of Science And Technology 18, no. 11 (2025): 848–60. https://doi.org/10.17485/ijst/v18i11.273.
Full textPh.D, Dr G. Karpaga Rajesh M. E. ,., Vaishnu Priya R, and Kaviya R. Jaya Divya Aj. "Security using Location Based Key LBK System for Effective Multipath Attack and Protection for Location Discrimination in Wireless Sensor Systems." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (2019): 446–50. http://dx.doi.org/10.31142/ijtsrd21377.
Full textBao, Yiqin, Qiang Zhao, Jie Sun, Wenbin Xu, and Hongbing Lu. "An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission." Mathematical Biosciences and Engineering 21, no. 1 (2023): 96–115. http://dx.doi.org/10.3934/mbe.2024005.
Full textQingru Ma, Qingru Ma, and Haowen Tan Qingru Ma. "D2D Group Key Agreement Scheme for Smart Devices in HANs." 網際網路技術學刊 24, no. 3 (2023): 659–64. http://dx.doi.org/10.53106/160792642023052403011.
Full textAbdulhameed, Islam Sami, Intisar Al-Mejibli, and Jolan Rokan Naif. "Improving Security and Privacy for Health Information and Images." Webology 19, no. 1 (2022): 2435–57. http://dx.doi.org/10.14704/web/v19i1/web19164.
Full textSai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.
Full textNamiyaly, A. E., B. B. Valiyev, A. O. Sagymbekova та A. Zh Adil. "ИСПОЛЬЗОВАНИЕ АНАЛИЗА ТОНАЛЬНОСТИ ДЛЯ ИЗУЧЕНИЯ КИБЕРБЕЗОПАСНОСТИ". INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES 3, № 2(10) (2022): 59–66. http://dx.doi.org/10.54309/ijict.2022.10.2.006.
Full textObach Lapieza, Anna, and María Ramos Sanz. "Elementos clave para la introducción de la perspectiva de género en las infraestructuras ciclistas." Hábitat y Sociedad, no. 13 (November 4, 2020): 87–105. http://dx.doi.org/10.12795/habitatysociedad.2020.i13.06.
Full textSamoylenko, H. T., and Yu Yu Yurchenko. "Key aspects of designing information infrastructure for a medical enterprise." Mathematical machines and systems 3 (2023): 59–64. http://dx.doi.org/10.34121/1028-9763-2023-3-59-64.
Full textSimeonova, Iliana, and Tsvetelina Metodieva. "MODEL FOR ADMINISTRATIVE SECURITY MANAGEMENT IN A MUNICIPALITY." Journal Scientific and Applied Research 26, no. 1 (2024): 93–105. http://dx.doi.org/10.46687/jsar.v26i1.397.
Full textNamiyaly, A. E., B. B. Valiyev та A. Sagymbekova. "Использование анализа тональности для изучения кибербезопасности". INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES, № 8(8) (4 березня 2022): 18–22. http://dx.doi.org/10.54309/ijict.2021.8.8.003.
Full textAn-Yuan Chang, An-Yuan Chang, and Po-Yen Lai An-Yuan Chang. "Research on key barriers and drivers for SME to implement sustainable manufacturing - an application of Fuzzy Delphi Method." 青年企業管理評論 15, no. 1 (2022): 001–18. http://dx.doi.org/10.53106/270308882022101501001.
Full textStrilets, Victoria, Olha Prokopenko, and Volodymyr Orlov. "Impact of Covid-19 on the budget security of the national economy: a forecast for Ukraine." Public and Municipal Finance 9, no. 1 (2020): 25–33. http://dx.doi.org/10.21511/pmf.09(1).2020.03.
Full textSayantan, Gupta. "QUANTUM FOG CLOUD MODEL IN INTERNET OF THINGS WITH ANALYSIS OF GREEN COMPUTING." International Journal of Research -GRANTHAALAYAH 5, no. 1 (2017): 230–38. https://doi.org/10.5281/zenodo.264026.
Full textDe Souza, Graziene Carneiro. "Islands of Stability: new conception on the use of force regarding the implementation of protection of civilians." Brazilian Journal of International Relations 5, no. 2 (2016): 431–53. http://dx.doi.org/10.36311/2237-7743.2016.v5n2.09.p431.
Full textSanchez, Dr Alejandro Rodriguez, and Prof Maria Lopez Garcia. "Cybersecurity for Industry 4.0: Safeguarding Manufacturing Systems for the Future." International journal of networks and security 5, no. 3 (2025): 13–21. https://doi.org/10.55640/ijns-05-01-02.
Full textTusher, Chandra Ghosh, and Ismail Jabiullah Md. "Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks." Recent Trends in Information Technology and its Application 4, no. 3 (2021): 1–11. https://doi.org/10.5281/zenodo.5573669.
Full textJohn, Siju, and S. N. Kumar. "6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images." Journal of Image and Graphics 12, no. 2 (2024): 117–26. http://dx.doi.org/10.18178/joig.12.2.117-126.
Full textAhmed, Mohammed Imran, Abdul Raheman Mohammed, Srujan Kumar, Sireesha Kolla, and Mohammed Kashif. "AI-Driven Green Construction: Optimizing Energy Efficiency, Waste Management and Security for Sustainable Buildings." Journal of Cognitive Computing and Cybernetic Innovations(JCCCI) 1, no. 1 (2025): 37–41. https://doi.org/10.21276/jccci/2025.v1.i1.7.
Full textEsther Omoniyi, Mofoluwawo. "Social Studies Education: A Roadmap for National Integration and Security Challenges in Nigeria." Himalayan Journal of Humanities and Cultural Studies 01, no. 01 (2020): 1–5. https://doi.org/10.47310/hjhcs.2020.v01i01.009.
Full textTagayeva, Faragat. "UZBEKISTAN AND THE ORGANIZATION OF TURKIC STATES: PROSPECTS FOR COOPERATION." Oriental Journal of Social Sciences 05, no. 01 (2025): 39–50. https://doi.org/10.37547/supsci-ojss-05-01-06.
Full textVamsi, Krishna Kokku. "Toward Secure IoT Infrastructure: Integrating Zero Trust, Federated Learning, and Dynamic Trust Management Models." Research and Reviews: Advancement in Cyber Security 2, no. 2 (2025): 19–25. https://doi.org/10.5281/zenodo.15281302.
Full textMazhnyk, Lidiia O., Iryna V. Lytovchenko, and Vladyslav O. Shakun. "Innovative Solutions for the Formation of Personnel Security of Online Entrepreneurship." Business Inform 1, no. 552 (2024): 146–53. http://dx.doi.org/10.32983/2222-4459-2024-1-146-153.
Full textKomen, Leah. "“Here you can use it”: Understanding mobile phone sharing and the concerns it elicits in rural Kenya." for(e)dialogue 1, no. 1 (2016): 52–65. http://dx.doi.org/10.29311/for(e)dialogue.v1i1.532.
Full textPryanikova, Alina A. "International Institutions Activity in the Field of Food Security." Administrative Consulting, no. 6 (186) (June 7, 2024): 137–52. https://doi.org/10.22394/1726-1139-2024-6-137-152.
Full textSeshagiri, Asha. "METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS." American Journal of Engineering and Technology 6, no. 10 (2024): 17–22. http://dx.doi.org/10.37547/tajet/volume06issue10-03.
Full textMmasi, Patience Robai. "Extensive Review of Security and Privacy Issues in Heterogeneous Networks." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 2955–84. https://doi.org/10.5281/zenodo.14830558.
Full textChaplynska, Natalia M., and Pavlo V. Makeienko. "INNOVATIVE SOLUTIONS FOR ENSURING ENERGY SECURITY OF UKRAINE AND THE WORLD." Academic Review 2, no. 59 (2023): 284–97. http://dx.doi.org/10.32342/2074-5354-2023-2-59-19.
Full textOmuya Odida, Maurice. "Exploring the Application of Artificial Neural Networks in Enhancing Security Measures For Cloud Computing: A Survey." Journal of Marine Science Research and Oceanography 7, no. 2 (2024): 01–12. http://dx.doi.org/10.33140/jmsro.07.02.02.
Full textSamoylenko, H. T., та Yu Yu Yurchenko. "Features of mathematical rationale for a complex datа security system of a medical enterprise". Mathematical machines and systems 4 (2023): 51–57. http://dx.doi.org/10.34121/1028-9763-2023-4-51-57.
Full textRay, Papri, R. Duraipandian, Gajjala Kiranmai, Rachana Rao, and Mathew John Jose. "An Exploratory Study of Risks and Food Insecurity in the Agri Supply Chain." Shanlax International Journal of Management 8, S1-Feb (2021): 1–12. http://dx.doi.org/10.34293/management.v8is1-feb.3752.
Full textMiroshnychenko, Vitalii. "Conceptual Models for Optimizing Infrastructure Solutions for Isps Based on Cloud Technologies." American Journal of Engineering and Technology 07, no. 06 (2025): 08–13. https://doi.org/10.37547/tajet/volume07issue06-02.
Full textYusif Asgarov, Mehdi. "Ətraf mühit təhlükəsizliyinin hüquqi tənzimlənməsi üzrə Azərbaycan ilə Avropa İttifaqı arasında əməkdaşlıq". SCIENTIFIC WORK 78, № 5 (2022): 209–14. http://dx.doi.org/10.36719/2663-4619/78/209-214.
Full textBiryukov, A. N., та A. M. Akchurina. "Анализ критериев оценки региональной экономической безопасности с учетом индикаторов инвестиционной составляющей". Экономика и управление: научно-практический журнал, № 4(178) (23 серпня 2024): 64–72. http://dx.doi.org/10.34773/eu.2024.4.11.
Full textAVHUSTYN, Ruslan, and Iryna DEMKIV. "STRATEGIC PROFIT MANAGEMENT AS A TOOL FOR ENSURING THE ECONOMIC SECURITY OF THE ENTERPRISE." Herald of Khmelnytskyi National University. Economic sciences 310, no. 5(1) (2022): 126–30. http://dx.doi.org/10.31891/2307-5740-2022-310-5(1)-20.
Full textVeernapu, Kiran. "Data Security in Healthcare with Machine Learning and Biometric Methods: Current Challenges, Solutions, and Future Directions." PROGRESS IN MEDICAL SCIENCES 6, no. 1 (2025): 1–6. https://doi.org/10.47363/PMS/2022(6)E162.
Full textAnisha, Godse, and Kulkarni Akanksha. "Security, Protection, Tools and Applications for Big Data." Journal of Network Security and Data Mining 7, no. 1 (2023): 29–46. https://doi.org/10.5281/zenodo.10073954.
Full text