Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
241
Provably secure rational delegation computation protocol
Published 2019-07-01Subjects: Get full text
Article -
242
Study on the Key Technologies of Smartphone Application Security
Published 2013-05-01Subjects: “…mobile phone security…”
Get full text
Article -
243
PHILOSOPHICAL AND SOCIOCULTURAL DIMENSIONS OF PERSONALITY PSYCHOLOGICAL SECURITY
Published 2018-12-01Subjects: “…security…”
Get full text
Article -
244
On the Road to Euro-Atlantic and Eurasian Security Community
Published 2012-10-01Get full text
Article -
245
Established interpretive practice on social security contributions
Published 2023-03-01Subjects: Get full text
Article -
246
Data security for internet plus in public cloud
Published 2017-10-01“…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
Get full text
Article -
247
Development trends of the information technology and cyberspace security
Published 2015-12-01Subjects: Get full text
Article -
248
Survey on industrial control protocol security research
Published 2024-06-01Subjects: Get full text
Article -
249
-
250
-
251
NATO and Energy Security: 25 Years in the Making
Published 2024-12-01Subjects: Get full text
Article -
252
Digitalization of business increases the costs of information security
Published 2020-04-01Subjects: “…information security…”
Get full text
Article -
253
Survey of the Internet of things operating system security
Published 2018-03-01Subjects: Get full text
Article -
254
-
255
Provable secure trusted protocol for network storage
Published 2011-01-01Subjects: “…provable security…”
Get full text
Article -
256
Research progress of chaotic secure optical communication
Published 2020-03-01Subjects: Get full text
Article -
257
EFFECT OF E-GOVERNANCE POLICY ON SECURITY IN NIGERIA
Published 2024-10-01Subjects: “…Security…”
Get full text
Article -
258
Representation model of structured document for multilevel security
Published 2012-09-01Subjects: Get full text
Article -
259
Security analysis on a kind of group signatures
Published 2003-01-01“…In this paper, we show there are still some security leaks in these schemes, and give some methods of forgery attack.…”
Get full text
Article -
260