-
81
Chaining & counter-based block cipher mode for authentication
Published 2009-01-01Subjects: Get full text
Article -
82
Translation of Value-Semantic Narratives in Public Digital Communication: Opportunities and Limitations
Published 2024-12-01Subjects: Get full text
Article -
83
Comparison and Analysis of Matching patterns using Simulation with Subsurface Navigation Approach Based on Magnetic Maps
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
84
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
Published 2022-01-01Subjects: Get full text
Article -
85
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
Published 2021-07-01Subjects: “…information security…”
Get full text
Article -
86
Behavior authentication of Web users based on machine learning
Published 2018-01-01Subjects: “…information security…”
Get full text
Article -
87
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01Subjects: Get full text
Article -
88
Research and design in dual network scheme of power corporation based on network isolation and secure data exchange
Published 2017-02-01Subjects: Get full text
Article -
89
Methodology and software development for auditing information security management systems
Published 2022-12-01Subjects: Get full text
Article -
90
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01Subjects: Get full text
Article -
91
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
92
Research on extended access control mechanism in online social network
Published 2021-10-01Subjects: Get full text
Article -
93
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an exa...
Published 2021-06-01Subjects: “…information security…”
Get full text
Article -
94
Prediction of Network Threats and Attacks by Mathematical Simulation
Published 2024-11-01Subjects: Get full text
Article -
95
THE ROLE OF INTERNATIONAL LEGAL INSTRUMENTS IN THE FORMATION OF A SECURITY ENVIRONMENT
Published 2024-05-01Subjects: “…security environment, international legal instrument, information security, international terrorism, international obligations.…”
Get full text
Article -
96
Power model in power analysis attack
Published 2012-09-01Subjects: “…information security…”
Get full text
Article -
97
On the parameter selection of randomness test
Published 2009-01-01Subjects: “…information security…”
Get full text
Article -
98
Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach
Published 2025-03-01Subjects: “…Information security policy…”
Get full text
Article -
99
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01Subjects: Get full text
Article -
100
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: “…information security…”
Get full text
Article