In literature:
Patrols are used to provide the necessary security against surprise.
"Infantry Drill Regulations, United States Army, 1911" by United States War Department
No wonder that such a community sought for means of security for its commerce.
"The Story of Russia" by R. Van Bergen
Quickly did they set to work to secure what was in the water, but it was of little value.
"Three Boys in the Wild North Land" by Egerton Ryerson Young
When we first went aboard our party of four desired to secure a table by ourselves.
"In Africa" by John T. McCutcheon
He secured one to his waist, as did I, signing to the Indians to hold the other ends.
"On the Banks of the Amazon" by W.H.G. Kingston
Even at that moment Spanish gallantry was maintained; no undue haste was shown by any to secure their own lives.
"Ronald Morton, or the Fire Ships" by W.H.G. Kingston
The officers were gathered aft, the men in the waist, holding on firmly to the stanchions, or anything to which they could secure themselves.
"The Three Admirals" by W.H.G. Kingston
I here easily disposed of my remaining skins for a good sum of money, which I secured in a band round my waist.
"Peter the Whaler" by W.H.G. Kingston
Some of the men were below; Jim and I and others were aft, and the rest, though half-drowned, managed to secure themselves.
"Peter Trawl" by W. H. G. Kingston
Our father is still unhappily blinded by the hope of securing worldly advantages, or he would not think of acting as he proposes.
"The Wanderers" by W.H.G. Kingston
We then ran in the gun and secured it.
"The Young Llanero" by W.H.G. Kingston
Their presence was intended to secure the fidelity of the rest.
"Famous Sea Fights" by John Richard Hale
He also had some money which he had secured in odd sums from time to time, safely put away in the chest beneath his bed.
"Far Past the Frontier" by James A. Braden
If the control of material things can make a group secure, the wealth owners in the United States are secure.
"The American Empire" by Scott Nearing
Something cannot be secured for nothing.
"Rural Life and the Rural School" by Joseph Kennedy
Sieyes was put in Rewbell's place in order to secure a better constitution.
"The Life of Napoleon Bonaparte" by William Milligan Sloane
It is to secure their custom that the vender must sell it for twenty dollars.
"Essentials of Economic Theory" by John Bates Clark
When rights are secure, property is secure in consequence.
"The Writings Of Thomas Paine, Complete" by Thomas Paine
How fortunate she was to secure his valuable services.
"Solaris Farm" by Milan C. Edson
The only way to secure a book better than the Bible is to secure a person better than Jesus.
"The Bible and Life" by Edwin Holt Hughes
***
In poetry:
"Dear God, what security,
comfort and bliss!
and to think, too what ages
have brought us to this!"
"Comfort" by Walter de la Mare
Thou labour'dst to secure
Freedom in this great land,
Not only to the white,
But to the colour'd band.
"Lines Inscribed To Benjamin Lundy, Esq." by Benjamin Cutler Clark
For as time should lengthen
From months into years
The trust should but strengthen
Secure from all fears.
"A Broken Friendship" by Anonymous British
Ronnan, I will defend: Do thou
securely go.--He went. He returned
on his day. But Durstan returned
before him.
"Fragment IX" by James Macpherson
CAPTAIN. Luis, sire, without delay
We secured; but not before
He killed three, and wounded more,
Of our company.
"The Purgatory Of St. Patrick - Act II" by Denis Florence MacCarthy
O hide me in Thy love, secure
From this earth-clinging meanness.
Lave my uncleanness
In Thy compassionating love!
"O Hide Me In Thy Love" by John Freeman
In news:
NFR Security's Sentivist Achieves Prominent Government Security Certification.
After a flurry of security breaches and a healthy public outcry over the holidays, travelers with iPhones can give the Transportation Security Administration a piece of their minds.
Breaches have become an inevitable part of IT security, making incident response an important element in security programs.
The Saudi government has deployed thousands of security forces in Mecca, Mina, Arafat, Muzdalifah, and cities within a 10 kilometer radius to ensure security of travelers taking part in the annual Hajj pilgrimage.
The Transportation Security Administration has posted a special Thanksgiving notice on its website reminding flyers about the foods they cannot bring through the security checkpoint.
WASHINGTON — The State Department removed a key security detail from Libya before the attack on the Benghazi consulate that killed a US ambassador — who had requested the security team be.
Rupesh Persaud, left, a behavior detection officer with the Transportation Security Administration, watches passengers at a security checkpoint at Newark Liberty International Airport in New Jersey in October.
A set of security recommendations for the transportation of certain quantities of hazardous materials across the nation's highways has been announced by the Transportation Security Administration (TSA).
Security Networks buys Proton Security.
Secretary of State Hillary Clinton speaks during a Security Council meeting to discuss Peace and Security in the Middle East during the.
Optimistically titled "U. S. Computer Emergency Readiness Team Makes Progress in Securing Cyberspace, but Challenges Remain," it paints a disturbing picture of a national security disaster waiting to happen.
Increased security at first Carrier Dome event since new security plan.
Security increased at the Carrier Dome on Friday night following new security measures implemented by Syracuse University and Syracuse Police.
A security officer performs a security check with a sniffer dog prior to the Nobel Prize Ceremony at Concert Hall on Dec 10, 2012, in Stockholm, Sweden.
7, 2002: Cameras and other gadgets will be a critical but limited tool as the United States and Canada step up security on their border, Homeland Security Director Tom Ridge said Friday.
***
In science:
In particular, we observed that it is hard to extend the security proof of HMQV to any of the proposed fixing solutions (indeed, HMQV was very carefully designed to enjoy provable security in the CK-framework).
A New Family of Practical Non-Malleable Diffie-Hellman Protocols
In particular, the special structure of sOAKE-HDR also much simplifies the security analysis of sOAKE by only using the standard forking lemma , and tightens the security reductions.
A New Family of Practical Non-Malleable Diffie-Hellman Protocols
However, as already stressed in , security against exposed DH-exponents is deemed to be the main and prime concern for any robust DHKE, and security against exposed offline pre-computed values (particularly, the DH-components) is important to both lower-power devices and to high volume servers .
A New Family of Practical Non-Malleable Diffie-Hellman Protocols
The above security analysis considers the security of OAKE-HDR/sOAKE-HDR against any other uncorrupted players other than the signer itself, i.e., the (in)feasibility of outputting a successful forgery (m1 , m0 , ˆA, A, ˆB , B , X0 , Y0 , r0 ) where ˆA is an uncorrupted player and ˆA 6= ˆB .
A New Family of Practical Non-Malleable Diffie-Hellman Protocols
The security reduction (from the security of sOAKE to the security of the underlying HDR signatures) is tighter than that of HMQV.
A New Family of Practical Non-Malleable Diffie-Hellman Protocols
In the second case, provided that the protocols can be securely composed, a secure randomness expansion protocol may allow a virtually unbounded amount of free randomness to be derived from a finite number of uses of partially free sources.
Free randomness can be amplified
Smart grid uses two-way communication systems for better monitoring towards lower energy consumption. In short, we must ensure that the integrators consider on security when combining devices system-wide. The satisfaction of a consumer depends on how strong the information security on the grid can be secured.
Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System
It is important to avoid baring any potential security risk. As a matter of fact, grid security technologies have been so far designed and deployed as a middleware layer add-on , independently at each tier.
Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System
Smart grid is already leveraging benefits of networking. Its technologies may even integrate with social networking sites , as well as associated security risks. This section examines network security, trust, and privacy concerns with regard to networking sites among consumers.
Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System
The point is, when communication is exposed to open and mass computing, the information security account is considered being enormously important, this leads to the thought on the crucial of information security functional requirement.
Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System
We prove our result by showing the security of a simple quantum protocol for the cryptographic primitive weak string erasure , which is known to be universal for two-party secure computation .
Quantum to Classical Randomness Extractors
Bellovin S. M. and Merritt M., Encrypted key exchange: Password-based protocols secure against dictionary attacks, Proc. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72–84, May 1992.
CompChall: Addressing Password Guessing Attacks
Rather, we will use specific properti es that arise from the “reconstruction paradigm ”-based proof that it is an extractor secure against quantum adversaries, and one may argue that Lemma 3 is implicit in the proof of security of Et given in [DPRV09].
Certifiable Quantum Dice - Or, testable exponential randomness expansion
Following the definition of security in the context of quantum key distribution outlined in [43, 44], we say that a protocol such as the one just presented is secure if, for any device behaviour and any m, the output R is uniformly random and independent from F .
Security of practical private randomness generation
In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context.
Randomness Quality of CI Chaotic Generators: Applications to Internet Security
***