Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
181
Research status and outlook of Android security
Published 2016-10-01Subjects: Get full text
Article -
182
Factorization of big integer and the security of RSA
Published 2017-05-01Subjects: Get full text
Article -
183
Making Simple Repairs: Home Security
Published 2019-05-01“… Keep your home safe and secure. When away from home, at night, or while sleeping lock your doors and windows. …”
Get full text
Article -
184
-
185
The Distribution of the Tax and Social Security Burden
Published 2021-04-01“…Abstract Using a cross-sectional analysis, this article investigates the burden of taxation and social security contributions across German households. The burden is determined with respect to household income as well as consumption level. …”
Get full text
Article -
186
Secure obfuscation for encrypted threshold signatures
Published 2020-06-01“…Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing the private key of threshold signature.Secondly,the security models of encrypted threshold signature functionality and the obfuscator were defined,such as the existential unforgeablity and the average case virtual black box property,and its correctness and security were proved.The analyses of theory and simulation experiment show that the obfuscation for encrypted threshold signature has feasibility.…”
Get full text
Article -
187
Covid-19 Implications to Transatlantic Security
Published 2024-04-01Subjects: Get full text
Article -
188
-
189
Research on evolution and security risk of Metaverse
Published 2022-04-01Subjects: Get full text
Article -
190
Research on cyberspace security situation awareness
Published 2016-10-01Subjects: “…cyber security…”
Get full text
Article -
191
-
192
Research on Security of Virtualization on Cloud Computing
Published 2015-06-01Subjects: Get full text
Article -
193
-
194
FEATURES OF THE CONCEPT AND CONTENT OF PUBLIC SECURITY
Published 2024-12-01Subjects: “…security; national security; public security; public order; public order; law and order; civil security…”
Get full text
Article -
195
Review of domestic and international financial security
Published 2017-02-01Subjects: “…financial information security…”
Get full text
Article -
196
Political discourse, military and securitization of health nexus: contemporary security challenges and the military role in public health security
Published 2020-02-01“…The purpose of this paper is to provide answers to the questions why health is viewed through the lens of national and international security, and what might be the potential role of the armed forces in strategic response to health security challenges. …”
Get full text
Article -
197
Construction of Intensive Security Domain Protection System for Service Platform——Discussion of Security Domain Division and Boundary Integration
Published 2013-08-01Subjects: “…security domain…”
Get full text
Article -
198
Provably secure and efficient proxy signature scheme
Published 2014-08-01“…The random oracles are combined in the scheme and a smaller vector norm blind message is used to control the dimension of proxy signature secret key. The security of proposed scheme is based on the hardness of shortest vector problem and small integer solution problem, and the scheme satisfies the security require-ments of a proxy signature scheme. …”
Get full text
Article -
199
Research on secure DPC localization algorithm of WSN
Published 2011-01-01Subjects: Get full text
Article -
200
Differential security evaluation of Piccolo-like structure
Published 2022-02-01“…In order to diversify the design of block cipher, Piccolo-like structure was proposed with principles of design.Security evaluation for Piccolo-like structure against differential cryptanalysis was deeply studied.By studying the input-output propagation characteristics of differential characteristics, the lower bound on the number of active round functions for arbitrary round Piccolo-like structure was given.The results show that, under the condition that the round functions are all bijective, there are at least l active round functions for l-round Piccolo-like structure if l≥6, and there are at least l-1 active round functions for l-round Piccolo-like structure if l is 1,2,3,4,5.…”
Get full text
Article