Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Modeling Security‐Check Queues
2011,
Zhang Zhe George
Motivated by the waiting lines between the U.S.–Canadian border crossings, we...
Security, independence, and sustainability: Imprecise language and the manipulation of energy policy in the United States
2013,
Littlefield Scott R
This article examines the impact of imprecise terminology on the energy policymaking...
Certificateless hybrid signcryption
2013,
Li Fagen
Signcryption is a cryptographic primitive that fulfills both the functions of digital...
Fully secure identity‐based signcryption scheme with shorter signcryptext in the standard model
2013,
Li Xiangxue
Identity‐based signcryption (IBSC) is a cryptographic primitive which combines...
A novel approach of audio watermarking based on S‐box transformation
2013,
Hussain Iqtadar
In this letter, we present a new audio watermarking technique using S ‐box...
Parallel systems under two sequential attacks with contest intensity variation
2013,
Levitin Gregory
Single and double attacks against a system of parallel elements are analyzed. The...
Supply chain security: an integrated framework for container terminal facilities
2012,
Longo Francesco
The goal of this paper is to present an ongoing research programme at Modelling and...
Hindering false event dissemination in VANETs with proof‐of‐work mechanisms
2012,
Palomar Esther
Solutions for a secure data dissemination in Vehicular Ad‐hoc Networks (VANETs)...
Maritime piracy: an analysis of attacks and violence
2012,
Yip Tsz Leung
Maritime piracy has become a core subject in maritime security and safety. Using ICC...
Scheduling commercial vehicle queues at a Canada–US border crossing
2012,
Haughton Michael
Using the context of queue operations at a major Canada–US commercial border...
The economic importance of the Straits of Malacca and Singapore: An extreme‐scenario analysis
2012,
Meng Qiang
This paper proposes a decision tree model to estimate the loss to global economy on...
Smart containers and the public goods approach to supply chain security
2012,
Prokop Darren
This paper will review the state of technology related to smart containers; discuss...
The cost‐benefit model for secure container network
2012,
Scholz-Reiter Bernd
The container industry has proved to be a remarkably efficient commercial system,...
Practical approaches towards enhanced security and visibility in international intermodal container supply chains
2012,
Veenstra Albert Willem
Nowadays, main participants in international container supply chains require better...
PERiMETER – pseudonymization and personal metadata encryption for privacy‐preserving searchable documents
2012,
Heurix Johannes
The average costs of data leakage are steadily on the rise. Especially in healthcare,...
Resource Allocation for Homeland Defense: Dealing with the Team Effect
2012,
Guikema Seth D
The federal government's allocation of resources for defense against potential attacks...
Security versus convenience? An experimental study of user misperceptions of wireless internet service quality
2012,
Kim Byung Cho
This paper demonstrates that consumers make incorrect inferences about...
Vulnerability based robust protection strategy selection in service networks
2012,
Ramirez-Marquez Jose Emmanuel
The disruption of critical infrastructures is currently a major security concern....
Using ordered attitudinal indicators in a latent variable choice model: a study of the impact of security on rail travel behaviour
2012,
Daly Andrew
There is growing interest in the use of models that recognise the role of...
Simulation‐based Selectee Lane queueing design for passenger checkpoint screening
2012,
Batta Rajan
There are two kinds of passenger checkpoint screening lanes in a typical US airport: a...
Scheduling Security Personnel for the Vancouver 2010 Winter Olympic Games
2012,
Kaluzny Bohdan L
The Vancouver 2010 Integrated Security Unit (V2010‐ISU) ensured security during...
Choquet integral for record linkage
2012,
Abril Daniel
Record linkage is used in data privacy to evaluate the disclosure risk of protected...
Estimating the Operational Impact of Container Inspections at International Ports
2011,
Gans Noah
A U.S. law mandating nonintrusive imaging and radiation detection for 100% of...
An Analysis of the Impact of Passenger Profiling for Transportation Security
2010,
Raghunathan Srinivasan
The proponents of airline passenger profiling claim that profiling will reduce the...
First Page
5
6
7
8
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers