Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
221
Assessment of Food Security in the East Kazakhstan Region
Published 2021-09-01Subjects: Get full text
Article -
222
THE ROLE OF THE UN SECURITY COUNCIL IN MAINTAINING PEACE
Published 2013-12-01Subjects: “…reform of the un security council…”
Get full text
Article -
223
Mobilisation relations: essence, experience, and security improvement
Published 2024-03-01Subjects: Get full text
Article -
224
IMPACT OF FLOODING ON HUMAN SECURITY IN NORTHERN NIGERIA
Published 2024-10-01Subjects: Get full text
Article -
225
Escrow mechanism for personal security keys on IBE
Published 2009-01-01Subjects: Get full text
Article -
226
-
227
Monitoring approach for online security of cryptographic protocol
Published 2016-06-01Subjects: Get full text
Article -
228
Analysis of Satellite Internet Security Risks and Countermeasures
Published 2024-03-01Subjects: Get full text
Article -
229
Research progress on secure data deduplication in cloud
Published 2016-11-01Subjects: “…secure deduplication…”
Get full text
Article -
230
Secure Biometric Verification in the Presence of Malicious Adversaries
Published 2025-01-01Subjects: Get full text
Article -
231
Survey of wireless sensor network security techniques
Published 2007-01-01Subjects: Get full text
Article -
232
TOWARDS A CONCEPTUALISATION OF RESILIENCE IN SECURITY STUDIES
Published 2020-04-01“…There is a vast literature in the subfields of security studies such as national security, emergency and disaster management, human and corporate security that problematizes this concept. …”
Get full text
Article -
233
Analysis and Practice of Cloud Computing Information Security
Published 2013-02-01Subjects: Get full text
Article -
234
Regional security of Turkey in the context of the Kurd problem
Published 2010-02-01Get full text
Article -
235
-
236
Method of designing security protocol for remote attestation
Published 2008-01-01“…By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability.…”
Get full text
Article -
237
European Security Architecture: Global and Regional Perspective
Published 2011-10-01Get full text
Article -
238
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
239
-
240
Theoretical Aspects of Analysis of International Environmental Security
Published 2015-10-01“…Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. …”
Get full text
Article