Buscar
Mostrando ítems 1-10 de 6482
Robust Lossless Semi Fragile Information Protection in Images
Internet security finds it difficult to keep the information secure and to maintain the integrity of the data. Sending messages over the internet secretly is one of the major tasks as it is widely used for passing the ...
Business and security sector reform: the case for corporate security responsibility
Companies make a significant contribution to creating jobs and generating
economic growth, raising living standards and helping to lift people out of
poverty. Most businesses manage in a responsible way their different ...
Bridges to prosperity: food security, the environment, and peace for Central America
(CIATSDCCIPCIMMYT, 2012)
The Fair and Equitable Treatment and Full Protection and Security as Investment Protection Standards Established in the Mexico-EU BITs.-Edición Única
(Instituto Tecnológico y de Estudios Superiores de Monterrey, 2010-05-01)
The Fair and Equitable Treatment and Full Protection and Security as Investment Protection Standards Established in the Mexico-EU BITs.-Edición Única
(Instituto Tecnológico y de Estudios Superiores de Monterrey, 2015)
Protecting Touch: Authenticated App-To-Server channels for mobile devices using NFC tags
(2017-07-06)
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range ...
Re-approaches And Possible Applications To The Concept Of Human SecurityRe-aproximaciones Y Posibles Aplicaciones Del Concepto De Seguridad Humana
(Departamento de Literatura Espaà ±ola-Universidad de Sevilla, 2016)