• American Museum Expedition on the Red Deer River. Fossils secured along the banks were packed and loaded aboard the large scow and floated down the river to the railway station
    American Museum Expedition on the Red Deer River. Fossils secured along the banks were packed and loaded aboard the large scow and floated down the river to the railway station
  • WordNet 3.6
    • n security measures taken as a precaution against theft or espionage or sabotage etc. "military security has been stepped up since the recent uprising"
    • n security an electrical device that sets off an alarm when someone tries to break in
    • n security a guarantee that an obligation will be met
    • n security freedom from anxiety or fear "the watch dog gave her a feeling of security"
    • n security a department responsible for the security of the institution's property and workers "the head of security was a former policeman"
    • n security defense against financial failure; financial independence "his pension gave him security in his old age","insurance provided protection against loss of wages due to illness"
    • n security property that your creditor can claim in case you default on your obligation "bankers are reluctant to lend without good security"
    • n security a formal declaration that documents a fact of relevance to finance and investment; the holder has a right to receive interest or dividends "he held several valuable securities"
    • n security the state of being free from danger or injury "we support the armed services in the name of national security"
    • ***

Additional illustrations & photos:

I will give any security you like I will give any security you like

Webster's Revised Unabridged Dictionary
  • Interesting fact: NASDAQ stand for, "National Association of Securities Dealers Automated Quotations."
    • Security An evidence of debt or of property, as a bond, a certificate of stock, etc.; as, government securities .
    • Security Freedom from apprehension, anxiety, or care; confidence of power or safety; hence, assurance; certainty.
    • Security Freedom from risk; safety.
    • Security Hence, carelessness; negligence; heedlessness.
    • Security One who becomes surety for another, or engages himself for the performance of another's obligation.
    • Security Something given, deposited, or pledged, to make certain the fulfillment of an obligation, the performance of a contract, the payment of a debt, or the like; surety; pledge.
    • Security That which secures or makes safe; protection; guard; defense.
    • Security The condition or quality of being secure; secureness.
    • ***
Century Dictionary and Cyclopedia
  • Interesting fact: In Shakespeare's time, mattresses were secured on bed frames by ropes when you pulled on the ropes the mattress tightened, making the bed firmer to sleep on. That's where the phrase, "goodnight, sleep tight" came from.
    • n security The state of being secure. Freedom from care, anxiety, or apprehension; confidence of safety; hence, unconcernedness; carelessness; heedlessness; over-confidence.
    • n security Freedom from annoyance, harm, danger, or loss; safety.
    • n security That which secures or makes safe; protection; defense; guard.
    • n security A guaranty or pledge; something given or deposited as surety for the fulfilment of a promise or an obligation, the payment of a debt, or the like.
    • n security A person who engages or pledges himself for the performance of another's obligations; one who becomes surety for another.
    • n security An evidence of debt or of property, as a bond or a certificate of stock: as, government securities.
    • ***
Chambers's Twentieth Century Dictionary
  • Interesting fact: Snoring is prohibited in Massachusetts unless all bedroom windows are closed and securely locked. It is also illegal to go to bed without first having a full bath.
    • Security state of being secure: freedom from fear: carelessness: protection: certainty: a pledge:
    • Security (pl.) bonds or certificates in evidence of debt or property
    • ***


  • James Russell Lowell
    “What a sense of security in an old book which time has criticized for us.”
  • Source Unknown
    Source Unknown
    “Courage comes from wanting to do it well. Security comes from knowing you can do it well. Confidence comes from having done it well.”
  • John Dryden
    “Happy the man, and happy he alone, he who can call today his own; he who, secure within, can say, tomorrow do thy worst, for I have lived today.”
  • Source Unknown
    Source Unknown
    “Desire for security keeps littleness little and threatens the great with smallness.”
  • Elbert Hubbard
    “Freedom is a condition of mind, and the best way to secure it is to breed it.”
  • Bertrand Russell
    “Freedom of opinion can only exist when the government thinks itself secure.”


Webster's Revised Unabridged Dictionary
L. securitas,: cf. F. sécurité,. See Secure, and cf. Surety
Chambers's Twentieth Century Dictionary
L. securusse- (for sine), without, cura, care.


In literature:

Wrap in each a slice of salmon, securing the paper around them, with a string or pins.
"Directions for Cookery, in its Various Branches" by Eliza Leslie
To secure the pulp without any of the skin, first peel the orange, as shown in Fig.
"Woman's Institute Library of Cookery, Vol. 5" by Woman's Institute of Domestic Arts and Sciences
The wall was not only solid and secure, but it was really handsome.
"Wyandotte" by James Fenimore Cooper
It is like the keel and ribs of a vessel or the frame of a house, the foundation upon which the bodies are securely built.
"A Practical Physiology" by Albert F. Blaisdell
On the Sabbath rest was secured to servants by the fourth commandment.
"The Anti-Slavery Examiner, Part 1 of 4" by American Anti-Slavery Society
A negro is directed to go into the woods and secure himself upon a tree.
"The Anti-Slavery Examiner, Part 2 of 4" by American Anti-Slavery Society
Second, the states for enacting laws to secure their victim.
"The Anti-Slavery Examiner, Part 3 of 4" by American Anti-Slavery Society
Her duty it is to watch for dead relatives, to secure them, and make them alive again (p. 132).
"Traditions of the Tinguian: A Study in Philippine Folk-Lore" by Fay-Cooper Cole
There are others which seem, at least, to make it difficult for one to secure social recognition.
"Analyzing Character" by Katherine M. H. Blackford and Arthur Newcomb
All laws to secure these ends will receive my best efforts for their enforcement.
"A Compilation of the Messages and Papers of the Presidents: Ulysses S. Grant" by James D. Richardson
It built Fort Yukon and secured much of the interior trade of Russian America.
"Overland through Asia; Pictures of Siberian, Chinese, and Tartar Life" by Thomas Wallace Knox
She has secured much, but by no means all, that the West has to give.
"Evolution Of The Japanese, Social And Psychic" by Sidney L. Gulick
But the place of Samuel Adams on the pages of history is secure.
"Little Journeys To the Homes of the Great, Volume 3 (of 14)" by Elbert Hubbard
They still perversely lulled themselves into a false security.
"The Johnstown Horror" by James Herbert Walker
What good is it having a 'security guard' if you're still not secure.
"Syndrome" by Thomas Hoover
The advantages secured by this combination of inventions were many and manifest.
"A History of the Growth of the Steam-Engine" by Robert H. Thurston
Water was secured for evening use only.
"Fifty Years In The Northwest" by William Henry Carman Folsom
He considered this as an essential security for the good behaviour of the Executive.
"The Journal of the Debates in the Convention which framed the Constitution of the United States, Volume II (of 2)" by James Madison
Furthermore, so situated, the reflector is quite secure from observation.
"Sharps and Flats" by John Nevil Maskelyne
Then, securing the rope securely, she watched me descend, her low sweet voice bidding me Godspeed.
"The Mystery of the Lost Dauphin" by Emilia Pardo Bazán

In poetry:

Thou God, whom heav’nly host obey,
How highly blest is he
Whose hope and trust, securely placed,
Is still reposed on Thee.
"O God of hosts, the mighty Lord," by Nahum Tate and Nicholas Brady
"Secured by fetter, cramp, and chain,
And gagged securely - so -
You shall be placed in Drury Lane,
Where only good lads go.
"The Two Ogres" by William Schwenck Gilbert
He wants to sift you all, as wheat,
And thinks his vict'ry sure;
But I his malice will defeat,
My prayer shall faith secure.
"The Believer's Danger, Safety, And Duty" by John Newton
Not for one single day
Can I discern my way,
But this I surely know,--
Who gives the day,
Will show the way,
So I securely go.
"The Day--The Way" by John Oxenham
Secure in their grave I shall be
From it all, and quiet then,
With no thought and no memory
Of the deeds and the dooms of men.
"The Suicide" by Thomas MacDonagh
On kings that reign as David did,
He pours his blessings down;
Secures their honors to their seed,
And well supports the crown.
"Psalm 18 part 2" by Isaac Watts

In news:

Security increased at the Carrier Dome on Friday night following new security measures implemented by Syracuse University and Syracuse Police.
A security officer performs a security check with a sniffer dog prior to the Nobel Prize Ceremony at Concert Hall on Dec 10, 2012, in Stockholm, Sweden.
One important way organizations can strengthen their network and IT security is by strengthening and consolidating the process surrounding network access and authentication, say many security professionals.
BC-US--Homeland Security Spending, 4th Ld-Writethru,680Homeland Security grant spending questionedAP Photo NY128.
7, 2002: Cameras and other gadgets will be a critical but limited tool as the United States and Canada step up security on their border, Homeland Security Director Tom Ridge said Friday.
They will not be able to bargain over security policies, procedures or the deployment of security personnel and equipment.
Saranac Lake, NY, Nov 19, 2012 — An investment banker and securities broker from Saranac Lake has been barred from the securities industry for defrauding his customers out of hundreds of thousands of dollars.
One sailor was shot by Naval security forces and another was taken into custody uninjured after they allegedly smashed their vehicle into two security units during a chase on the San Diego Naval Base early Saturday morning.
0 Former White House cyber-security coordinator Howard Schmidt speaks at an Internet security conference in Anaheim.
Director of the national security studies program at the New America Foundation and CNN national security analyst.
Co-written with synthetic biology expert Andrew Hessel and global security expert Marc Goodman, the story examines the dawning of the era of personalized bio -weapons and the incredible threat these pose to national security.
The Securities & Exchange Commission actually pays rewards for tips about securities fraud.
The Social Security Board of Trustees today released its annual report on the financial health of the Social Security Trust Funds.
"They really have stepped it up by bringing a lot of those fast (DPS) boats in," said Rep Henry Cuellar, D-Laredo, the ranking Democrat on the House Homeland Security subcommittee on Border and Maritime Security.
Los Alamos National Security, LLC, is bringing in outside counsel to help it deal with the botched construction of a security upgrade at the lab.

In science:

As for encryption of communication protocols, XMPP has already provided the encryption characteristic in its standard. XMPP supports the Simple Authentication and Security Layer (SASL) framework and Transport Layer Security (TLS) protocol.
Interoperability and Standardization of Intercloud Cloud Computing
Cryptographers as important cryptographic primitives. • Security engineers as techniques to employ in distributed security applications.
Social Secret Sharing for Resource Management in Cloud
Security concerns are • Traditional security • Availability • Third-party Data Control At the same time there are also some security issues that can be encounter.
Social Secret Sharing for Resource Management in Cloud
Price, Security for Computer Networks, An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, 2nd ed. (John Wiley & Sons, Chichester, 1989).
A Comparative Study of Some Pseudorandom Number Generators
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called “cryptographic hash functions”.
The Random Oracle Methodology, Revisited
Using this notion of an implementation, we would like to say that a function f is a “good implementation of a random oracle” if for any ideal system Π, security of Π implies security of the implementation of Π using f .
The Random Oracle Methodology, Revisited
Upon formulating the random oracle methodology, Bellare and Rogaway did warn that a proof of security in the Random Oracle Model should not be taken as guarantee to the security of implementations (in which the Random Oracle is replaced by functions such as MD5) .
The Random Oracle Methodology, Revisited
Informal Theorem 1.2 There exists encryption and signature schemes that are secure in the Random Oracle Model, but have no secure implementation in the real model (where a Random Oracle does not exist).
The Random Oracle Methodology, Revisited
Still, the lesson is that the mere fact that a scheme is secure in the Random Oracle Model does not necessarily imply that a particular implementation of it (in the real world) is secure, or even that this scheme does not have any “structural flaws”.
The Random Oracle Methodology, Revisited
That is, given an ideal cryptographic application A, we can construct an ideal cryptographic application A′ such that A′ is just as secure as A (in the Random Oracle Model), but A′ has no secure implementation.
The Random Oracle Methodology, Revisited
Hence, in this sense, security of an ideal system in the Random Oracle Model is a bad predictor of the security of an implementation of the system in real life.
The Random Oracle Methodology, Revisited
This section demonstrates that the security of a cryptographic scheme in the Random Oracle Model does not always imply its security under some specific choice of a “good hash function” that is used to implement the random oracle.
The Random Oracle Methodology, Revisited
The underlying idea is to start with a secure scheme (which may or may not use a random oracle) and modify it to get a scheme that is secure in the Random Oracle Model, but such that its security is easily violated when trying to replace the random oracle by any ensemble.
The Random Oracle Methodology, Revisited
This allows us to prove a weaker statement, saying that for any function ensemble F , there exists a signature scheme that is secure in the Random Oracle Model, but is not secure when implemented using F .
The Random Oracle Methodology, Revisited
This, by itself, means that one cannot construct a function ensemble that provides secure implementation of any cryptographic scheme that is secure in the Random Oracle Model.
The Random Oracle Methodology, Revisited