Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
341
Security evaluation method for confidential and stable complex systems
Published 2019-04-01Subjects: Get full text
Article -
342
Heterogeneous redundancies scheduling algorithm for mimic security defense
Published 2018-07-01Subjects: “…mimic security defense…”
Get full text
Article -
343
Correction: A lightweight and secure protocol for teleworking environment
Published 2024-01-01Get full text
Article -
344
Equipment network management security of electrical power PTN
Published 2015-12-01Subjects: Get full text
Article -
345
«Human Security»: Concept, Political Discourse, and Ways of Implimintation
Published 2010-12-01“…На фоне существования множес- тва трактовок human security наиболее адекватно её смысл передаёт термин безопасность личности. …”
Get full text
Article -
346
Security monitoring system of intelligent substation based on IoT
Published 2018-09-01Subjects: Get full text
Article -
347
Security signaling optimization in optical network for smart substation
Published 2019-02-01Subjects: Get full text
Article -
348
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: “…provable secure…”
Get full text
Article -
349
Secure Localization in Wireless Sensor Networks with Mobile Beacons
Published 2012-10-01“…We present a scheme, called SLMB, for secure sensor localization in WSNs in which we propose to use a mobile beacon node with the goal of reducing the overall energy consumption in sensor nodes during sensor localization. …”
Get full text
Article -
350
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Published 2024-12-01Subjects: Get full text
Article -
351
THE PERSPECTIVES OF INTERNATIONAL REGULATION OF PRIVATE MILITARY AND SECURITY COMPANIES’
Published 2016-04-01Subjects: “…private military and security companies…”
Get full text
Article -
352
Research on vulnerability and security technology of industrial Ethernet protocol
Published 2017-11-01Subjects: Get full text
Article -
353
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01Subjects: Get full text
Article -
354
Security analysis and improvement of a certificateless signcryption scheme
Published 2015-03-01“…To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently,Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. A strongly secure certificateless signcryption without bilinear pairings was also proposed, which was provably secure in the random oracle model under the assumption that the discrete logarithm problem and the computational Diffie-Hellman problems were intractable. …”
Get full text
Article -
355
Modified security model based on dynamic trusted degree
Published 2008-01-01Subjects: “…security architecture…”
Get full text
Article -
356
Improving the information security sustainability of the economy financial sector
Published 2023-06-01“…The study analyzes the main activities of Russia Bank, aimed at ensuring the sustainability of information security in the financial sector of the economy, as well as ongoing activities aimed at limiting the spread of cybercrime based on an automated incident handling system. …”
Get full text
Article -
357
Systematic literature review on Internet-of-Vehicles communication security
Published 2018-12-01“…As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. …”
Get full text
Article -
358
Universally composable secure multiparty computation protocol with fairness
Published 2014-02-01Subjects: Get full text
Article -
359
Research on software-defined network and the security defense technology
Published 2017-11-01Subjects: Get full text
Article -
360
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01Subjects: Get full text
Article