Articoli di riviste sul tema "Trust by the way of security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Trust by the way of security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund". Challenge 49, n. 3 (giugno 2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.
Wang, Haoxiang. "Review on Trust Building Algorithms in IoT Security". Journal of ISMAC 3, n. 4 (19 aprile 2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.
Bräunlich, Katharina, e Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems". International Journal of Information Security and Privacy 7, n. 2 (aprile 2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.
Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, Nanthini Pattabiraman, Sathiyaroobaa Vasuthevan, Eman Mohamed Abdusalam e Mustafa M. Barakat. "Cloud-Based Global Online Marketplaces Review on Trust and Security". International Journal of Interactive Mobile Technologies (iJIM) 13, n. 04 (10 aprile 2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.
Zhakshylykova, T. A. "Psychological trust in social networks". Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), n. 8 (7 agosto 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.
Kim, Sangyoung, e Taebok Lee. "Factors affecting information security compliance intention of military officer". Journal of Advances in Military Studies 5, n. 1 (30 aprile 2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.
Cao, Xiao Mei, Hai Tao Zhu, He Yang Shen e Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network". Applied Mechanics and Materials 462-463 (novembre 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.
Siriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools". International Research Journal of Innovations in Engineering and Technology 08, n. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Kumawat, Shyamlal, e Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective". INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, n. 2 (25 ottobre 2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.
Sreevidya, B., e Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications". Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, n. 1 (29 marzo 2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.
El-Sayed, Hesham, Sharmi Sankar, Heng Yu e Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs". International Journal of Computers Communications & Control 12, n. 5 (10 settembre 2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.
Xu, Mingyang, Junli Guo, Haoyu Yuan e Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture". Electronics 12, n. 4 (4 febbraio 2023): 782. http://dx.doi.org/10.3390/electronics12040782.
Pavlidis, Michalis, Haralambos Mouratidis e Shareeful Islam. "Modelling Security Using Trust Based Concepts". International Journal of Secure Software Engineering 3, n. 2 (aprile 2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.
Zhi, Kuiyun, Qiurong Tan, Si Chen, Yongjin Chen, Xiaoqin Wu, Chenkai Xue e Anbang Song. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction". International Journal of Environmental Research and Public Health 19, n. 11 (3 giugno 2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.
Joshi, Prince, Vishal Dhangar, Manish Muchhala e Surajbhan Singh Mandloi. "Cloud Computing Security". International Journal for Research in Applied Science and Engineering Technology 11, n. 1 (31 gennaio 2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.
Yan, Ye, e Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective". Sustainability 10, n. 7 (17 luglio 2018): 2495. http://dx.doi.org/10.3390/su10072495.
Manalu, Ignasius Falentino, Basrah Saidani e Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta". Jurnal Bisnis, Manajemen, dan Keuangan 3, n. 1 (21 ottobre 2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.
Singh, Supriya. "The Social Dimensions of the Security of Internet Banking". Journal of Theoretical and Applied Electronic Commerce Research 1, n. 2 (1 agosto 2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.
Sun, Po-Ling, e Cheng-Yuan Ku. "Review of threats on trust and reputation models". Industrial Management & Data Systems 114, n. 3 (8 aprile 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Usman, Aminu Bello, William Liu, Quan Bai e Ajit Narayanan. "Trust of the Same". International Journal of Information Security and Privacy 9, n. 2 (aprile 2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.
Lalli, M., e J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET". Asian Journal of Engineering and Applied Technology 7, n. 2 (5 novembre 2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.
Curtis, Shelby R., Jessica Rose Carre e Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach". Managerial Auditing Journal 33, n. 4 (3 aprile 2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.
Negi, Shalabh, e Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES". Asian Journal of Pharmaceutical and Clinical Research 10, n. 13 (1 aprile 2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.
Nurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG". Jurnal Ecogen 1, n. 4 (21 dicembre 2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.
Wenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination". Review of European Administrative Law 13, n. 3 (15 ottobre 2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.
Jagadamba, G., e B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment". International Journal of Systems and Service-Oriented Engineering 6, n. 4 (ottobre 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Udayana, IBN, Putri Dwi Cahyani e Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)". Journal Competency of Business 2, n. 1 (2 luglio 2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.
Chen, Guangxuan, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen e Qiang Liu. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud". International Journal of Digital Crime and Forensics 10, n. 1 (gennaio 2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.
Leahy, Darragh, e Christina Thorpe. "Zero Trust Container Architecture (ZTCA)". International Conference on Cyber Warfare and Security 17, n. 1 (2 marzo 2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.
Urmetzer, Florian, e Isabelle Walinski. "User Acceptance and Mobile Payment Security". International Journal of E-Services and Mobile Applications 6, n. 2 (aprile 2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.
Sa’diyah, Mima Halimatus, e Dedi Sulistiyo Soegoto. "The Effect of Perceived Security towards Intention to Use Digital Payment through a Trust". Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 2 (1 dicembre 2021): 233–38. http://dx.doi.org/10.34010/icobest.v2i.277.
Nitta, Mellania Ariya, e Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen". Journal of Management and Bussines (JOMB) 4, n. 2 (19 dicembre 2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.
Gupta, Vishwajit, e Sumitra Shukla. "Consumer Trust in Digital Banking: A Qualitative Study of Legal and Regulatory Impacts". Interdisciplinary Studies in Society, Law, and Politics 3, n. 2 (2024): 18–24. http://dx.doi.org/10.61838/kman.isslp.3.2.4.
Ma, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu e Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization". Future Internet 16, n. 5 (10 maggio 2024): 163. http://dx.doi.org/10.3390/fi16050163.
Olaniyi, Oluwaseun Oladeji. "Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies". Asian Journal of Research in Computer Science 17, n. 5 (15 marzo 2024): 172–89. http://dx.doi.org/10.9734/ajrcos/2024/v17i5447.
Nasreen, Irfana, Kashif Rathore e Kashif Ali. "WORKPLACE SECURITY;". Professional Medical Journal 24, n. 01 (18 gennaio 2017): 150–65. http://dx.doi.org/10.29309/tpmj/2017.24.01.422.
M. Habash, Rania, e Mahmood Khalel. "ZERO TRUST SECURITY MODEL FOR ENTERPRISE NETWORKS". Iraqi Journal of Information and Communication Technology 6, n. 2 (31 agosto 2023): 68–77. http://dx.doi.org/10.31987/ijict.6.2.223.
Þórisdóttir, Hulda, e Eva Heiða Önnudóttir. "Need for security and system fairness on the political extremes". Veftímaritið Stjórnmál og stjórnsýsla 11, n. 2 (15 dicembre 2015): 115. http://dx.doi.org/10.13177/irpa.a.2015.11.2.1.
Prokin, A. A. "Cloud Security Data Critical Review". Journal of Computational and Theoretical Nanoscience 17, n. 9 (1 luglio 2020): 4715–17. http://dx.doi.org/10.1166/jctn.2020.9366.
Agrawal, Arpit, e Shubhangi Verma. "A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol". Oriental journal of computer science and technology 10, n. 2 (26 maggio 2017): 460–66. http://dx.doi.org/10.13005/ojcst/10.02.29.
Li, Dawei, Enzhun Zhang, Ming Lei e Chunxiao Song. "Zero trust in edge computing environment: a blockchain based practical scheme". Mathematical Biosciences and Engineering 19, n. 4 (2022): 4196–216. http://dx.doi.org/10.3934/mbe.2022194.
Farooq, Umer, Muhammad Asim, Noshina Tariq, Thar Baker e Ali Ismail Awad. "Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security". Sensors 22, n. 12 (16 giugno 2022): 4539. http://dx.doi.org/10.3390/s22124539.
Mannix, Kealan, Aengus Gorey, Donna O’Shea e Thomas Newe. "Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them". Journal of Sensor and Actuator Networks 11, n. 3 (8 agosto 2022): 43. http://dx.doi.org/10.3390/jsan11030043.
Li, Jing, e Qinyuan Li. "Data security and risk assessment in cloud computing". ITM Web of Conferences 17 (2018): 03028. http://dx.doi.org/10.1051/itmconf/20181703028.
Wang, Zhiqiang, Xinyue Yu, Peiyang Xue, Yunhan Qu e Lei Ju. "Research on Medical Security System Based on Zero Trust". Sensors 23, n. 7 (6 aprile 2023): 3774. http://dx.doi.org/10.3390/s23073774.
Bingzhang, Lee, e Anton Mamoiko. "DEVELOPING SELF-EXECUTING SMART CONTRACTS ON ETHEREUM FOR CONTAINER SHIPPING IN CHINA". T-Comm 16, n. 8 (2022): 38–45. http://dx.doi.org/10.36724/2072-8735-2022-16-8-38-45.
Nabilah, Yasmin Rajaa, e Andri Nurtantiono. "PENGARUH WORD OF MOUTH (WOM), KUALITAS PELAYANAN, KEAMANAN DAN KEPERCAYAAN TERHADAP KEPUTUSAN KONSUMEN MENGGUNAKAN JASA TRANSPORTASI ONLINE GRABBIKE DI KOTA SURAKARTA". JURNAL ILMIAH EDUNOMIKA 5, n. 1 (12 febbraio 2021): 61. http://dx.doi.org/10.29040/jie.v5i1.1381.
Ali Azmi, Muhammad, Sulhaini Sulhaini e Dwi Putra Buana Sakti. "The Influence Of Privacy, Security, And Trust On Costumer Loyalty Lazada Applications In Lombok Island". PROCEEDING INTERNATIONAL CONFERENCE ON ECONOMICS, BUSINESS AND INFORMATION TECHNOLOGY (ICEBIT) 4 (14 luglio 2023): 247–55. http://dx.doi.org/10.31967/prmandala.v4i0.754.
Habibur Rahman, Md, Md Al-Amin e Nusrat Sharmin Lipy. "An Investigation on The Intention to Adopt Mobile Banking on Security Perspective in Bangladesh". Risk and Financial Management 2, n. 2 (15 dicembre 2020): p47. http://dx.doi.org/10.30560/rfm.v2n2p47.
Kydd, Andrew. "Trust Building, Trust Breaking: The Dilemma of NATO Enlargement". International Organization 55, n. 4 (2001): 801–28. http://dx.doi.org/10.1162/002081801317193600.