Academic literature on the topic 'Secur'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secur.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secur"

1

Zivanovic, Irena, Jacek Kociszewski, Jakob Eberhard, and Volker Viereck. "Bladder perforation after TVT-Secur™ procedure: how secure is TVT-Secur™?" Archives of Gynecology and Obstetrics 289, no. 1 (2013): 131–34. http://dx.doi.org/10.1007/s00404-013-2968-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Incavo, Stephen J., Bruce D. Beynnon, and Kathryn M. Coughlin. "Total Hip Arthroplasty with the Secur-Fit and Secur-Fit Plus Femoral Stem Design." Journal of Arthroplasty 23, no. 5 (2008): 670–76. http://dx.doi.org/10.1016/j.arth.2007.05.044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hota, Lekha S., Katherine Hanaway, Michele R. Hacker, et al. "TVT-Secur (Hammock) Versus TVT-Obturator." Female Pelvic Medicine & Reconstructive Surgery 18, no. 1 (2012): 39–43. http://dx.doi.org/10.1097/spv.0b013e31823bdbcf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Molden, Stephanie M., and Vincent R. Lucente. "New minimally invasive slings: TVT Secur." Current Urology Reports 9, no. 5 (2008): 358–61. http://dx.doi.org/10.1007/s11934-008-0062-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Uddain, Jasim. "Enhancing food safety and security through organic agriculture and innovative fertilizer management." Asian-Australasian Journal of Food Safety and Security 8, no. 2 (2024): 27–31. http://dx.doi.org/10.3329/aajfss.v8i2.74060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kabir, SM Lutful. "Nourishing minds and bodies: the imperative of food safety and security." Asian-Australasian Journal of Food Safety and Security 8, no. 1 (2024): 1–4. http://dx.doi.org/10.3329/aajfss.v8i1.71842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Neogi, Sucharit Basu. "Addressing the climate-food-health nexus: strengthening ecosystem-based adaptation and One Health." Asian-Australasian Journal of Food Safety and Security 9, no. 1 (2025): 1–4. https://doi.org/10.3329/aajfss.v9i1.79031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Richard, Patrick, Louis-Olivier Gagnon, and Le Mai Tu. "“U-Method” TVT-Secur Slings: Are they obstructive?" Canadian Urological Association Journal 6, no. 2 (2012): 104–7. http://dx.doi.org/10.5489/cuaj.11124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hale, John, and Paul Brusil. "Secur(e/ity) Management: A Continuing Uphill Climb." Journal of Network and Systems Management 15, no. 4 (2007): 525–53. http://dx.doi.org/10.1007/s10922-007-9079-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khandwala, Salil, and Chaandini Jayachandran. "TVT-Secur in Office Sling Procedure Under Local Anesthesia." Female Pelvic Medicine & Reconstructive Surgery 18, no. 4 (2012): 233–38. http://dx.doi.org/10.1097/spv.0b013e318259f6b2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secur"

1

Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2005.<br>Ramachandran, Umakishore, Committee Member ; Lee, Wenke, Committee Member ; Blough, Douglas M., Committee Member ; Venkateswaran, H., Committee Member ; Ahamad, Mustaque, Committee Member. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
2

Neubert, Janek. "Secure WebServer." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Belostotsky, Eugene B. (Eugene Boris). "Secure SNMP." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42758.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (leaves 51-52).<br>by Eugene B. Belostotsky.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
4

Mahar, Anthony J. "Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/34434.

Full text
Abstract:
<p>Software protection is increasingly necessary for a number of applications, ranging from commercial systems and digital content distributors, to military systems exposed in the field of operations. As computing devices become more pervasive, and software more complex, insufficiencies with current software protection mechanisms have arisen. Software--only and data--only protection systems have resulted in broken systems that are vulnerable to loss of software confidentiality and integrity. </p><p> A growing number of researchers have suggested that hardware encryption mechanisms be employe
APA, Harvard, Vancouver, ISO, and other styles
5

Tanik, Guven Orkun. "Secure Mail Gateway." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612038/index.pdf.

Full text
Abstract:
Past few decades witnessed the birth and explosive growth of the internet and the communications &ndash<br>most notably the electronic mail- through it. Studies indicate that although security measures are deployed, their usage is very limited and problematic. This work proposes a system to address some of the shortcomings of present mail security systems, such as underutilization, complicated key management and unwanted immunization against filtering-scanning. A two-layer message encryption scheme with domain level keys is introduced and a performance analysis is presented. An analysis of the
APA, Harvard, Vancouver, ISO, and other styles
6

Muhovic, Admir. "Secure Wireless Communication." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92023.

Full text
Abstract:
The need for and requests for utilization of wireless equipment are growing rapidly. Advantages of using wireless communication are easy to realize. Having access to electronically stored information no matter where you are is a big advantage. Furthermore, wireless communication is increasingly utilized in everyday work and there is a constant development of new wireless equipment. Today, utilization of wireless communication is very practical as well as effective. On the other hand, using wireless equipment and communication entails risk unless efforts are made to secure this communication. S
APA, Harvard, Vancouver, ISO, and other styles
7

St-Jules, Michael. "Secure Quantum Encryption." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35371.

Full text
Abstract:
To the field of cryptography, quantum mechanics is a game changer. The exploitation of quantum mechanical properties through the manipulation of quantum information, the information encoded in the state of quantum systems, would allow many protocols in use today to be broken as well as lead to the expansion of cryptography to new protocols. In this thesis, quantum encryption, i.e. encryption schemes for quantum data, is defined, along with several definitions of security, broadly divisible into semantic security and ciphertext indistinguishability, which are proven equivalent, in analogy to th
APA, Harvard, Vancouver, ISO, and other styles
8

Guler, Sevil. "Secure Bitcoin Wallet." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177587.

Full text
Abstract:
Virtual currencies and mobile banking are technology advancements that are receiving increased attention in the global community because of their accessibility, convenience and speed. However, this popularity comes with growing security concerns, like increasing frequency of identity theft, leading to bigger problems which put user anonymity at risk. One possible solution for these problems is using cryptography to enhance security of Bitcoin or other decentralised digital currency systems and to decrease frequency of attacks on either communication channels or system storage. This report outl
APA, Harvard, Vancouver, ISO, and other styles
9

Volaco, Gustavo Capobiano. "Viver ou secar?" reponame:Repositório Institucional da UFPR, 2010. http://hdl.handle.net/1884/23548.

Full text
Abstract:
Resumo: Este trabalho está escrito para demonstrar que aquilo que paralisa Fabiano, Vitória e seus filhos, não é tanto, como a crítica canônica tem insistido, mero efeito de relações econômicas desiguais ou fruto de um ambiente inóspito que subjuga aqueles o habitam. Seus conflitos, antes de se constituírem como sociais, são gerados e alimentados pelas palavras naquilo que elas tem de mais próprio, ou seja, por mais esforço que façamos, elas insistem em não selar um sentido unívoco, um destino traçado ou uma vida mais natural. Seu caráter protéico não permite facilmente um assentamento do ser
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Nan. "SECURE IMAGE PROCESSING." UKnowledge, 2007. http://uknowledge.uky.edu/gradschool_theses/448.

Full text
Abstract:
In todays heterogeneous network environment, there is a growing demand for distrusted parties to jointly execute distributed algorithms on private data whose secrecy needed to be safeguarded. Platforms that support such computation on image processing purposes are called secure image processing protocols. In this thesis, we propose a new security model, called quasi information theoretic (QIT) security. Under the proposed model efficient protocols on two basic image processing algorithms linear filtering and thresholding are developed. For both problems we consider two situations: 1) only tw
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secur"

1

Laird, Robbin F. Britain's security policy: The Modern Soviet view. Alliance for the Institute for European Defence & Strategic Studies, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Donnelly, C. N. Nations, alliances and security: A collection of writings. Akadémiai Kiadó, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mima, Cataldo, ed. The Women's encampment for a future of peace and justice: Images and writings. Temple University Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Laere, Frederik Lucien de. Secuur. Poeziecentrum V.Z.W., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baumgart, Rainer. Secure Networking — CQRE [Secure] ’ 99. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hegarty, Cain. Suffolk's defended shore: Coastal fortifications from the air. English Heritage, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leader, Jeffery J. Chaotic keystream generators for additive stream ciphers. Naval Postgraduate School, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barker, Harold. Secure forever. Loizeaux Bros., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lange, James. Retire Secure! John Wiley & Sons, Ltd., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Samalin, Samuel. Secure UNIX. McGraw-Hill, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secur"

1

Sakamuri, Lokesh, Sai Chandana Thiruvuru, Rohit Gupta Kunala, et al. "Optimum Transportation Scheme for Healthcare Supply Chain Management." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hammad, Mohamed, Gauhar Ali, Mohammed A. El-Affendi, Yassine Maleh, and Ahmed A. Abd El-Latif. "Introduction." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ali, Gauhar, Mohammed El-Affendi, and Ahmed A. Abd El-Latif. "Securing Digital Health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sahid, Abdelkebir. "Securing Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yassine, Maleh, and Taqafi Issam. "Securing the Future of E-health." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jafar, Uzma, and Hafiz Adnan Hussain. "Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zainuddin, Ahmad Anwar, Muhammad Hazrin Fahmi bin Abd Halim, Nur Syafika Bahrudin, Aida Shahiedun, Nik Muhammd Faris Firdaus bin Norazman, and Muhammad Falikh Fikri bin Mohd Fauzi. "IoT Application, Privacy, and Security in Healthcare." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hammad, Mohamed. "Biometric Security and Access Management in E-health Services." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Do, Phuc Hao, Thanh Liem Tran, Van Dai Pham, Abdelhamied A. Ateya, and Tran Duc Le. "Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification." In Secure Health. CRC Press, 2024. http://dx.doi.org/10.1201/9781003470038-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hughes, Vera, and David Weller. "Secure." In People in Retailing. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-09897-2_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secur"

1

Sulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.

Full text
Abstract:
The demand for cloud-based deep learning has intensified the need for secure computation. Our quantum-secure deep learning protocol leverages quantum properties of light and telecommunication components for scalable, secure cloud-based deep learning in optical networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Nath, Sumon, Agustin Navarro-Torres, Alberto Ros, and Biswabandan Panda. "Secure Prefetching for Secure Cache Systems." In 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2024. https://doi.org/10.1109/micro61859.2024.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rezaei, Tahereh, Chitra Vadlamani, Amir Kalev, and Jonathan L. Habif. "Quantum Pulse Position Modulation using Entangled States for Communication Security." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jw2a.86.

Full text
Abstract:
Introducing Quantum Pulse Position Modulation (QPPM): an entanglement-based, secure pulse position modulation approach using two-mode entangled light and ther-mal noise for stealthy data transmission. Quantum bounds ensure secure symbol decoding, baffling eavesdroppers.
APA, Harvard, Vancouver, ISO, and other styles
4

Meng, Xuanqi, Jiarun Zhou, Xiulong Liu, Xinyu Tong, Wenyu Qu, and Jianrong Wang. "Secur-Fi: A Secure Wireless Sensing System Based on Commercial Wi-Fi Devices." In IEEE INFOCOM 2023 - IEEE Conference on Computer Communications. IEEE, 2023. http://dx.doi.org/10.1109/infocom53939.2023.10229055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ovilla-Martinez, Brisbane, and Lilian Bossuet. "Restoration protocol: Lightweight and secur devices authentication based on PUF." In 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC). IEEE, 2017. http://dx.doi.org/10.1109/vlsi-soc.2017.8203460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Steger, Marco, Carlo Boano, Michael Karner, Joachim Hillebrand, Werner Rom, and Kay Romer. "SecUp: Secure and Efficient Wireless Software Updates for Vehicles." In 2016 Euromicro Conference on Digital System Design (DSD). IEEE, 2016. http://dx.doi.org/10.1109/dsd.2016.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Chao, Wen Yu Kon, Hong Jie Ng, and Charles C. W. Lim. "Experimental symmetric private information retrieval with measurement-device-independent quantum network." In CLEO: Fundamental Science. Optica Publishing Group, 2023. http://dx.doi.org/10.1364/cleo_fs.2023.ff1a.3.

Full text
Abstract:
We report the first realisation of a provably-secure symmetric private information retrieval (SPIR) scheme supported by a quantum-secure key-exchange network, offering secure retrieval of fingerprint data from a database with 800 entries.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-to-Cloud) and V2X(Vehicle-to-Everything). This has pushed classical automotive system in background and vehicle components are now increasingly dominated by software’s. Now more focus is made on to increase self-decision-making capabilities of a
APA, Harvard, Vancouver, ISO, and other styles
9

Felcan, Miroslav. "Historical Cross-Section of Arson." In Safe and Secure Society. The College of European and Regional Studies, 2020. http://dx.doi.org/10.36682/ssc_2020/1.

Full text
Abstract:
This work was supported by the Agency for Research and Development under the contract no. APVV-17-0217.Every year fires cause big damage to society, property, environment, buildings and infrastructure and pose a threat to life and health of persons in endangered areas. In most cases arson serves as insurance fraud or cover up any crime (e.g. robbery, embezzlement). However, there may be other reasons, e.g. in the case of the Commission of the European Union, the use of the product in envy, hatred, threats, blackmail, competitive struggle. Or social, political, or ethnic differences. In several
APA, Harvard, Vancouver, ISO, and other styles
10

Yun-kyung Lee and Jeong-Nye Kim. "Secure mobile services using secure region." In 2013 International Conference on ICT Convergence (ICTC). IEEE, 2013. http://dx.doi.org/10.1109/ictc.2013.6675510.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secur"

1

Nelson, Cynthia Lee. Secure portal. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/921125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dunigan, T. H., and N. Venugopal. Secure PVM. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/406053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krishnan, S., J. Laganier, M. Bonola, and A. Garcia-Martinez. Secure Proxy ND Support for SEcure Neighbor Discovery (SEND). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Archer, M., D. A. Frincke, and K. Levitt. Secure resource management: Specifying and testing secure operating systems. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/6023693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shands, Deborah. Secure Virtual Enclaves. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada402350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Luu, Brian B. Secure Link Middleware. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada485508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada501670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aderholdt, Ferrol, Blake A. Caldwell, Susan Elaine Hicks, et al. Secure Storage Architectures. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1195819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada636498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gibbs, P. W. Secure Transportation Management. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1160060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!