Journal articles on the topic 'Trust by the way of security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Trust by the way of security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Full textWang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Full textBräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Full textGhazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Full textZhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Full textNajib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.
Full textKim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Full textOrkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.
Full textVenkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.
Full textSurendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.
Full textCao, Xiao Mei, Hai Tao Zhu, He Yang Shen, and Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network." Applied Mechanics and Materials 462-463 (November 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.
Full textKumawat, Shyamlal, and Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, no. 2 (2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.
Full textSiriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Full textBasco-Galangco, R. B., and D. L. Chinayo. "The State of Police Legitimacy Through the People's Trust and Satisfaction in the Performance of the Police of Their Duties." American Journal of Multidisciplinary Research and Innovation 1, no. 6 (2022): 47–55. https://doi.org/10.54536/ajmri.v1i6.872.
Full textRagul, M., A. Aloysius, and V. Arulkumar. "Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation." Indian Journal Of Science And Technology 18, no. 7 (2025): 526–38. https://doi.org/10.17485/ijst/v18i7.3783.
Full textRevanth P S B.E. "Blockchain-Secured and VPN Integrated Power Systems Management." Dandao Xuebao/Journal of Ballistics 37, no. 1 (2025): 25–34. https://doi.org/10.52783/dxjb.v37.166.
Full textSreevidya, B., and Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.
Full textEl-Sayed, Hesham, Sharmi Sankar, Heng Yu, and Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs." International Journal of Computers Communications & Control 12, no. 5 (2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.
Full textPavlidis, Michalis, Haralambos Mouratidis, and Shareeful Islam. "Modelling Security Using Trust Based Concepts." International Journal of Secure Software Engineering 3, no. 2 (2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.
Full textXu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (2023): 782. http://dx.doi.org/10.3390/electronics12040782.
Full textYan, Ye, and Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective." Sustainability 10, no. 7 (2018): 2495. http://dx.doi.org/10.3390/su10072495.
Full textZhi, Kuiyun, Qiurong Tan, Si Chen, et al. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.
Full textDr., Namita Mittal. "User Perceptions of Privacy and Security in Online Social Networks." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 91–94. https://doi.org/10.5281/zenodo.7547576.
Full textJoshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Full textSun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Full textAlmarri, Seetah, and Ahmed Aljughaiman. "Blockchain Technology for IoT Security and Trust: A Comprehensive SLR." Sustainability 16, no. 23 (2024): 10177. http://dx.doi.org/10.3390/su162310177.
Full textManalu, Ignasius Falentino, Basrah Saidani, and Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta." Jurnal Bisnis, Manajemen, dan Keuangan 3, no. 1 (2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.
Full textSingh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.
Full textCurtis, Shelby R., Jessica Rose Carre, and Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach." Managerial Auditing Journal 33, no. 4 (2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.
Full textUsman, Aminu Bello, William Liu, Quan Bai, and Ajit Narayanan. "Trust of the Same." International Journal of Information Security and Privacy 9, no. 2 (2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.
Full textNegi, Shalabh, and Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.
Full textLalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Full textOla, Adegboyega Adedolapo. "Electoral Violence and Arms Proliferation in Nigeria: Causes, Consequences and Way Forward." African Journal of Stability and Development (AJSD) 11, no. 2 (2018): 446–59. http://dx.doi.org/10.53982/ajsd.2018.1102.13-j.
Full textCvetković, Vladimir M., Milan Lipovac, Renate Renner, Svetlana Stanarević, and Zlatko Raonić. "A Predictive Framework for Understanding Multidimensional Security Perceptions Among Students in Serbia: The Role of Institutional, Socio-Economic, and Demographic Determinants of Sustainability." Sustainability 17, no. 11 (2025): 5030. https://doi.org/10.3390/su17115030.
Full textNurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.
Full textJagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Full textWenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination." Review of European Administrative Law 13, no. 3 (2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.
Full textKhuspe, Snehal Tukaram. "A Study on the Impact of Cybersecurity Threats on Consumer Trust in E-Commerce: A Case of Navi Mumbai." International Journal of Economics, Business, Accounting, Agriculture and Management towards Paradigm Shift in Research (IJEBAMPSR) 2, no. 1 (2025): 172–76. https://doi.org/10.5281/zenodo.15294244.
Full textKapse, Smita, Latesh Malik, and Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS." ASEAN Engineering Journal 14, no. 2 (2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.
Full textDoton, Wlson. "THE ROLE OF DATA SECURITY IN THE WORLD OF EDUCATION TO INCREASE PARENTAL TRUST." Educational Researcher Journal 1, no. 3 (2024): 41–48. https://doi.org/10.71288/educationalresearcherjournal.v1i3.19.
Full textUdayana, IBN, Putri Dwi Cahyani, and Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)." Journal Competency of Business 2, no. 1 (2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.
Full textPatel, Jay. "Prospects of Cloud-Driven Deep Learning- Leading the Way for Safe and Secure AI." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 8, no. 3 (2020): 57–63. https://doi.org/10.55083/irjeas.2020.v08i03011.
Full textUrmetzer, Florian, and Isabelle Walinski. "User Acceptance and Mobile Payment Security." International Journal of E-Services and Mobile Applications 6, no. 2 (2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.
Full textChen, Guangxuan, Liping Ding, Jin Du, et al. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud." International Journal of Digital Crime and Forensics 10, no. 1 (2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.
Full textLeahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.
Full textSyed, (Shawon) M. Rahman, and Lackey Robert. "E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 193–210. https://doi.org/10.5281/zenodo.4059648.
Full textD., Maheswari, and G. K. Kamalam Dr. "ART: AN ATTACK-RESISTANT TRUST MANAGEMENT SCHEME FOR MISBEHAVIOR DETECTION IN VANET." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 29–34. https://doi.org/10.5281/zenodo.345656.
Full textMa, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu, and Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization." Future Internet 16, no. 5 (2024): 163. http://dx.doi.org/10.3390/fi16050163.
Full textNitta, Mellania Ariya, and Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen." Journal of Management and Bussines (JOMB) 4, no. 2 (2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.
Full textS.Rajaram. "Secure Routing Path Using Trust Values for Wireless Sensor Networks." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 10. https://doi.org/10.5281/zenodo.7407765.
Full text