Artículos de revistas sobre el tema "Trust by the way of security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Trust by the way of security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund". Challenge 49, n.º 3 (junio de 2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Texto completoWang, Haoxiang. "Review on Trust Building Algorithms in IoT Security". Journal of ISMAC 3, n.º 4 (19 de abril de 2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Texto completoBräunlich, Katharina y Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems". International Journal of Information Security and Privacy 7, n.º 2 (abril de 2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Texto completoGhazali, Osman, Chun Yang Leow, Shahzad Qaiser, Nanthini Pattabiraman, Sathiyaroobaa Vasuthevan, Eman Mohamed Abdusalam y Mustafa M. Barakat. "Cloud-Based Global Online Marketplaces Review on Trust and Security". International Journal of Interactive Mobile Technologies (iJIM) 13, n.º 04 (10 de abril de 2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Texto completoZhakshylykova, T. A. "Psychological trust in social networks". Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), n.º 8 (7 de agosto de 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Texto completoKim, Sangyoung y Taebok Lee. "Factors affecting information security compliance intention of military officer". Journal of Advances in Military Studies 5, n.º 1 (30 de abril de 2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Texto completoCao, Xiao Mei, Hai Tao Zhu, He Yang Shen y Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network". Applied Mechanics and Materials 462-463 (noviembre de 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.
Texto completoSiriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools". International Research Journal of Innovations in Engineering and Technology 08, n.º 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Texto completoKumawat, Shyamlal y Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective". INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, n.º 2 (25 de octubre de 2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.
Texto completoSreevidya, B. y Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications". Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, n.º 1 (29 de marzo de 2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.
Texto completoEl-Sayed, Hesham, Sharmi Sankar, Heng Yu y Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs". International Journal of Computers Communications & Control 12, n.º 5 (10 de septiembre de 2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.
Texto completoXu, Mingyang, Junli Guo, Haoyu Yuan y Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture". Electronics 12, n.º 4 (4 de febrero de 2023): 782. http://dx.doi.org/10.3390/electronics12040782.
Texto completoPavlidis, Michalis, Haralambos Mouratidis y Shareeful Islam. "Modelling Security Using Trust Based Concepts". International Journal of Secure Software Engineering 3, n.º 2 (abril de 2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.
Texto completoZhi, Kuiyun, Qiurong Tan, Si Chen, Yongjin Chen, Xiaoqin Wu, Chenkai Xue y Anbang Song. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction". International Journal of Environmental Research and Public Health 19, n.º 11 (3 de junio de 2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.
Texto completoJoshi, Prince, Vishal Dhangar, Manish Muchhala y Surajbhan Singh Mandloi. "Cloud Computing Security". International Journal for Research in Applied Science and Engineering Technology 11, n.º 1 (31 de enero de 2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Texto completoYan, Ye y Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective". Sustainability 10, n.º 7 (17 de julio de 2018): 2495. http://dx.doi.org/10.3390/su10072495.
Texto completoManalu, Ignasius Falentino, Basrah Saidani y Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta". Jurnal Bisnis, Manajemen, dan Keuangan 3, n.º 1 (21 de octubre de 2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.
Texto completoSingh, Supriya. "The Social Dimensions of the Security of Internet Banking". Journal of Theoretical and Applied Electronic Commerce Research 1, n.º 2 (1 de agosto de 2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.
Texto completoSun, Po-Ling y Cheng-Yuan Ku. "Review of threats on trust and reputation models". Industrial Management & Data Systems 114, n.º 3 (8 de abril de 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Texto completoUsman, Aminu Bello, William Liu, Quan Bai y Ajit Narayanan. "Trust of the Same". International Journal of Information Security and Privacy 9, n.º 2 (abril de 2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.
Texto completoLalli, M. y J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET". Asian Journal of Engineering and Applied Technology 7, n.º 2 (5 de noviembre de 2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Texto completoCurtis, Shelby R., Jessica Rose Carre y Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach". Managerial Auditing Journal 33, n.º 4 (3 de abril de 2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.
Texto completoNegi, Shalabh y Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES". Asian Journal of Pharmaceutical and Clinical Research 10, n.º 13 (1 de abril de 2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.
Texto completoNurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG". Jurnal Ecogen 1, n.º 4 (21 de diciembre de 2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.
Texto completoWenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination". Review of European Administrative Law 13, n.º 3 (15 de octubre de 2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.
Texto completoJagadamba, G. y B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment". International Journal of Systems and Service-Oriented Engineering 6, n.º 4 (octubre de 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Texto completoUdayana, IBN, Putri Dwi Cahyani y Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)". Journal Competency of Business 2, n.º 1 (2 de julio de 2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.
Texto completoChen, Guangxuan, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen y Qiang Liu. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud". International Journal of Digital Crime and Forensics 10, n.º 1 (enero de 2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.
Texto completoLeahy, Darragh y Christina Thorpe. "Zero Trust Container Architecture (ZTCA)". International Conference on Cyber Warfare and Security 17, n.º 1 (2 de marzo de 2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.
Texto completoUrmetzer, Florian y Isabelle Walinski. "User Acceptance and Mobile Payment Security". International Journal of E-Services and Mobile Applications 6, n.º 2 (abril de 2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.
Texto completoSa’diyah, Mima Halimatus y Dedi Sulistiyo Soegoto. "The Effect of Perceived Security towards Intention to Use Digital Payment through a Trust". Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 2 (1 de diciembre de 2021): 233–38. http://dx.doi.org/10.34010/icobest.v2i.277.
Texto completoNitta, Mellania Ariya y Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen". Journal of Management and Bussines (JOMB) 4, n.º 2 (19 de diciembre de 2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.
Texto completoGupta, Vishwajit y Sumitra Shukla. "Consumer Trust in Digital Banking: A Qualitative Study of Legal and Regulatory Impacts". Interdisciplinary Studies in Society, Law, and Politics 3, n.º 2 (2024): 18–24. http://dx.doi.org/10.61838/kman.isslp.3.2.4.
Texto completoMa, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu y Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization". Future Internet 16, n.º 5 (10 de mayo de 2024): 163. http://dx.doi.org/10.3390/fi16050163.
Texto completoOlaniyi, Oluwaseun Oladeji. "Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies". Asian Journal of Research in Computer Science 17, n.º 5 (15 de marzo de 2024): 172–89. http://dx.doi.org/10.9734/ajrcos/2024/v17i5447.
Texto completoNasreen, Irfana, Kashif Rathore y Kashif Ali. "WORKPLACE SECURITY;". Professional Medical Journal 24, n.º 01 (18 de enero de 2017): 150–65. http://dx.doi.org/10.29309/tpmj/2017.24.01.422.
Texto completoM. Habash, Rania y Mahmood Khalel. "ZERO TRUST SECURITY MODEL FOR ENTERPRISE NETWORKS". Iraqi Journal of Information and Communication Technology 6, n.º 2 (31 de agosto de 2023): 68–77. http://dx.doi.org/10.31987/ijict.6.2.223.
Texto completoÞórisdóttir, Hulda y Eva Heiða Önnudóttir. "Need for security and system fairness on the political extremes". Veftímaritið Stjórnmál og stjórnsýsla 11, n.º 2 (15 de diciembre de 2015): 115. http://dx.doi.org/10.13177/irpa.a.2015.11.2.1.
Texto completoProkin, A. A. "Cloud Security Data Critical Review". Journal of Computational and Theoretical Nanoscience 17, n.º 9 (1 de julio de 2020): 4715–17. http://dx.doi.org/10.1166/jctn.2020.9366.
Texto completoAgrawal, Arpit y Shubhangi Verma. "A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol". Oriental journal of computer science and technology 10, n.º 2 (26 de mayo de 2017): 460–66. http://dx.doi.org/10.13005/ojcst/10.02.29.
Texto completoLi, Dawei, Enzhun Zhang, Ming Lei y Chunxiao Song. "Zero trust in edge computing environment: a blockchain based practical scheme". Mathematical Biosciences and Engineering 19, n.º 4 (2022): 4196–216. http://dx.doi.org/10.3934/mbe.2022194.
Texto completoFarooq, Umer, Muhammad Asim, Noshina Tariq, Thar Baker y Ali Ismail Awad. "Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security". Sensors 22, n.º 12 (16 de junio de 2022): 4539. http://dx.doi.org/10.3390/s22124539.
Texto completoMannix, Kealan, Aengus Gorey, Donna O’Shea y Thomas Newe. "Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them". Journal of Sensor and Actuator Networks 11, n.º 3 (8 de agosto de 2022): 43. http://dx.doi.org/10.3390/jsan11030043.
Texto completoLi, Jing y Qinyuan Li. "Data security and risk assessment in cloud computing". ITM Web of Conferences 17 (2018): 03028. http://dx.doi.org/10.1051/itmconf/20181703028.
Texto completoWang, Zhiqiang, Xinyue Yu, Peiyang Xue, Yunhan Qu y Lei Ju. "Research on Medical Security System Based on Zero Trust". Sensors 23, n.º 7 (6 de abril de 2023): 3774. http://dx.doi.org/10.3390/s23073774.
Texto completoBingzhang, Lee y Anton Mamoiko. "DEVELOPING SELF-EXECUTING SMART CONTRACTS ON ETHEREUM FOR CONTAINER SHIPPING IN CHINA". T-Comm 16, n.º 8 (2022): 38–45. http://dx.doi.org/10.36724/2072-8735-2022-16-8-38-45.
Texto completoNabilah, Yasmin Rajaa y Andri Nurtantiono. "PENGARUH WORD OF MOUTH (WOM), KUALITAS PELAYANAN, KEAMANAN DAN KEPERCAYAAN TERHADAP KEPUTUSAN KONSUMEN MENGGUNAKAN JASA TRANSPORTASI ONLINE GRABBIKE DI KOTA SURAKARTA". JURNAL ILMIAH EDUNOMIKA 5, n.º 1 (12 de febrero de 2021): 61. http://dx.doi.org/10.29040/jie.v5i1.1381.
Texto completoAli Azmi, Muhammad, Sulhaini Sulhaini y Dwi Putra Buana Sakti. "The Influence Of Privacy, Security, And Trust On Costumer Loyalty Lazada Applications In Lombok Island". PROCEEDING INTERNATIONAL CONFERENCE ON ECONOMICS, BUSINESS AND INFORMATION TECHNOLOGY (ICEBIT) 4 (14 de julio de 2023): 247–55. http://dx.doi.org/10.31967/prmandala.v4i0.754.
Texto completoHabibur Rahman, Md, Md Al-Amin y Nusrat Sharmin Lipy. "An Investigation on The Intention to Adopt Mobile Banking on Security Perspective in Bangladesh". Risk and Financial Management 2, n.º 2 (15 de diciembre de 2020): p47. http://dx.doi.org/10.30560/rfm.v2n2p47.
Texto completoKydd, Andrew. "Trust Building, Trust Breaking: The Dilemma of NATO Enlargement". International Organization 55, n.º 4 (2001): 801–28. http://dx.doi.org/10.1162/002081801317193600.
Texto completo