Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3281
Eggshell waste as a promising adsorbent for phosphorus recovery from wastewater: A review
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3282
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3283
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
3284
Black carp RNF115 restricts IRF3/7-mediated antiviral signaling in innate immunity
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3285
Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3286
Taxonomic and functional diversity of protists in saline and hypersaline lakes in southern Western Siberia, a region strongly affected by climate change
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3287
ЧЕЛОВЕК РАЗУМНЫЙ И ЧЕЛОВЕК ИСКУССТВЕННЫЙ: СОЦИАЛЬНАЯ БЕЗОПАСНОСТЬ ИЛИ ИЛЛЮЗИЯ БЕЗОПАСНОСТИ
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3288
Microbial diversity and biogeography across gastrointestinal tracts of Takifugu pufferfish revealed by full-length 16S amplicon sequencing
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
3289
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
3290
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
3291
ГРУППЫ РИСКА РАЗВИТИЯ ТРЕВОГИ И ДЕПРЕССИИ СРЕДИ РОССИЯН СТАРШЕ 60 ЛЕТ (РЕЗУЛЬТАТЫ СОЦИОЛОГИЧЕСКОГО ИССЛЕДОВАНИЯ)...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
3292
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3293
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3294
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
3295
Indifferentiable hash functions in the standard model
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
3296
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
3297
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
3298
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
3299
Private feasible solution determination
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
3300
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article