Literatura científica selecionada sobre o tema "Trust by the way of security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Trust by the way of security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Trust by the way of security"
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Texto completo da fonteWang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Texto completo da fonteBräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Texto completo da fonteGhazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Texto completo da fonteZhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Texto completo da fonteNajib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.
Texto completo da fonteKim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Texto completo da fonteOrkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.
Texto completo da fonteVenkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.
Texto completo da fonteSurendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.
Texto completo da fonteTeses / dissertações sobre o assunto "Trust by the way of security"
Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.
Texto completo da fonteManor, Mike. "The home front : civil rights, American values, and public trust when America is at war /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=cfa77bfd-34c7-403f-9f65-cbb4037fa454&rs=PublishedSearch.
Texto completo da fonteLemaitre, Freddy. "La monnaie comme objet de sûretés." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020044.
Texto completo da fonteGilberg, Ole Rasmus. "Cloud Security without Trust." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26713.
Texto completo da fonteKarthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.
Texto completo da fonteLeonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Texto completo da fonteBilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality." Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.
Texto completo da fonteElsalamouny, Ehab M. "Probablistic trust models in network security." Thesis, University of Southampton, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536340.
Texto completo da fonteEl, Salamouny Ehab. "Probabilistic trust models in network security." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.
Texto completo da fontePoirrier, Alexandre. "Formal Security of Zero Trust Architectures." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAX050.
Texto completo da fonteLivros sobre o assunto "Trust by the way of security"
Bacevich, A. J. Breach of trust: How Americans failed their soldiers and their country. Metropolitan Books, Henry Holt and Company, 2013.
Encontre o texto completo da fonteBörsch-Supan, Axel. The German public pension system: How it was, how it will be. National Bureau of Economic Research, 2004.
Encontre o texto completo da fonteBörsch-Supan, Axel. The German public pension system: How it was, how it will be. National Bureau of Economic Research, 2004.
Encontre o texto completo da fonteGarbis, Jason, and Jerry W. Chapman. Zero Trust Security. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8.
Texto completo da fonteRoman, Rodrigo, and Jianying Zhou, eds. Security and Trust Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91859-0.
Texto completo da fonteKatsikas, Sokratis K., and Cristina Alcaraz, eds. Security and Trust Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01141-3.
Texto completo da fonteBarthe, Gilles, Evangelos Markatos, and Pierangela Samarati, eds. Security and Trust Management. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46598-2.
Texto completo da fonteJøsang, Audun, Pierangela Samarati, and Marinella Petrocchi, eds. Security and Trust Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4.
Texto completo da fonteAccorsi, Rafael, and Silvio Ranise, eds. Security and Trust Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41098-7.
Texto completo da fonteSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Texto completo da fonteCapítulos de livros sobre o assunto "Trust by the way of security"
Singh, Rajiv Ranjan, José Moreira, Tom Chothia, and Mark D. Ryan. "Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties." In Security and Trust Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_1.
Texto completo da fonteFischer-Hübner, Simone, and Farzaneh Karegar. "Addressing Challenges: A Way Forward." In Synthesis Lectures on Information Security, Privacy, and Trust. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-54158-2_5.
Texto completo da fonteWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, François Barrere, and AbdelMalek Benzekri. "Which Web Browsers Process SSL Certificates in a Standardized Way?" In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_38.
Texto completo da fonteGolia, Silvia. "Trust and security in Italy." In Proceedings e report. Firenze University Press and Genova University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0106-3.42.
Texto completo da fonteChiru, Irena, Cristina Ivan, and Silviu Paicu. "Reforming Intelligence in Ukraine: The Past, Present, and Future." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-66434-2_17.
Texto completo da fonteBonura, Susanna, Davide dalle Carbonare, Roberto Díaz-Morales, Ángel Navia-Vázquez, Mark Purcell, and Stephanie Rossello. "Increasing Trust for Data Spaces with Federated Learning." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_5.
Texto completo da fontePark, Eun G. "Trust in Virtual Communities." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch165.
Texto completo da fonteVashishth, Tarun Kumar, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, and Rajneesh Panwar. "Enhancing Cloud Security." In Improving Security, Privacy, and Trust in Cloud Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch004.
Texto completo da fonteBrosso, Ines, and Alessandro La Neve. "Information Security Management Based on Adaptive Security Policy Using User Behavior Analysis." In Strategic and Practical Approaches for Information Security Governance. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0197-0.ch019.
Texto completo da fonteOermann, Andrea, and Jana Dittmann. "Trust in E-Technologies." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch209.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Trust by the way of security"
Yang, Zhihuan, Wenlong Tian, Ruixuan Li, Xuming Ye, and Zhiyong Xu. "Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00206.
Texto completo da fonteAlfieri, Costanza, Suriya Ganesh, Limin Ge, Jingxin Shi, and Norman Sadeh. "“I was Diagnosed with …”: Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPT." In 2024 21st Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2024. https://doi.org/10.1109/pst62714.2024.10788076.
Texto completo da fontePélissier, Samuel, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, and Mathieu Cunche. "Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?" In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00189.
Texto completo da fonteR, Sreelatha, and Abhay Yelsangiker. "Zero Trust Security Architecture." In 2024 Recent Advances in Sustainable Engineering and Future Technologies (RASEFT). IEEE, 2024. https://doi.org/10.1109/raseft61414.2024.00034.
Texto completo da fonteRies, Sebastian, Marc Fischlin, Leonardo A. Martucci, and Max Muuhlhauser. "Learning Whom to Trust in a Privacy-Friendly Way." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.30.
Texto completo da fonteFeng, Huan, and Kang G. Shin. "Masquerade of mobile applications: Introducing unlinkability in a practical way." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906937.
Texto completo da fonteHoa, Huynh Van, Chan Dai Truyen Thai, Nguyen Thi Yen Linh, and Vo Nguyen Quoc Bao. "Security for Selected Two-Way Relay with Different Trust Degrees and Friendly Jammers." In 2021 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2021. http://dx.doi.org/10.1109/atc52653.2021.9598201.
Texto completo da fonteLy, Stephen, and Yuan Cheng. "A Data-based Protocol for One-way Trust in Inter-vehicular Communication." In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. ACM, 2021. http://dx.doi.org/10.1145/3445969.3450430.
Texto completo da fonteChen, Muqian, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, and Binxing Fang. "Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00097.
Texto completo da fonteLiang, Shan, Yuewu Wang, Lingguang Lei, Jiwu Jing, and Quan Zhou. "SecureESFS: Sharing Android External Storage Files in a Securer Way." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00180.
Texto completo da fonteRelatórios de organizações sobre o assunto "Trust by the way of security"
Deitelhoff, Nicole, Rainer Forst, Vinzenz Hediger, and Tobias Wille. Trust in conflict : notes on a research program. ConTrust - Trust in Conflict. Research Centre "Normative Orders" of Goethe University Frankfurt am Main, 2025. https://doi.org/10.21248/gups.90950.
Texto completo da fonteFlagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200051.
Texto completo da fonteArtis, Roslyn, Connie Ledoux Book, Jennifer Clinton, John S. Lucas, James P. Pellow, and Dawn Michele Whitehead. Advancing Global Stability and U.S. National Security through Peaceful Exchange. The International Coalition (coordinated by The Forum on Education Abroad), 2021. http://dx.doi.org/10.36366/ic.agsausnstpe.03312021.
Texto completo da fonteArmstrong, Beth, Lucy King, Robin Clifford, and Mark Jitlal. Food and You 2 - Wave 2. Food Standards Agency, 2021. http://dx.doi.org/10.46756/sci.fsa.dws750.
Texto completo da fonteArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 6 Key Findings. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.djj797.
Texto completo da fonteArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You: Wave 5. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.fqq357.
Texto completo da fonteMcFee, Erin. Research Brief: Environmental Peacebuilding with Formerly Armed Actors. Trust After Betrayal, 2024. http://dx.doi.org/10.59498/21970.
Texto completo da fonteArmstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 7 Key Findings. Food Standards Agency, 2024. http://dx.doi.org/10.46756/sci.fsa.qqj935.
Texto completo da fonteVilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011448.
Texto completo da fonteOshio, Takashi. Social Security and Trust Fund Management. National Bureau of Economic Research, 2004. http://dx.doi.org/10.3386/w10444.
Texto completo da fonte