Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4301
Fiscal Decentralisation and Services Delivery in Mbarara Central Market.
Published 2024“…Although fiscal decentralization is often promoted as a means to enhance local governance and improve service provision, its actual impact on security, sanitation, and utility services is not well understood. …”
Get full text
Thesis -
4302
Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments
Published 2020-05-01“…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
Get full text
Article -
4303
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01“…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
Get full text
Article -
4304
Public key based key distribution scheme for wireless sensor networks
Published 2011-01-01“…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public key set and a hash function in base station.Each sensor device was pre-distributed one public/private pair-wise key from public key set and a public key subset from the initial public keys set.Owing to uniqueness of private key,not only the communication security problems could be improved for WSN.but also the sensor-memory cost could be decreased.With the theorem of random-graph theory,the connectivity and scalability were illustrated.The results showed that the scheme was superior to the traditional key pre-distribution schemes.…”
Get full text
Article -
4305
Éducation à la défense et enseignement de l’histoire des guerres
Published 2018-06-01“…This paper aims to deal with the relation between values and knowledge in history teaching (especially of wars) and defense and security education. This defense education is questioned through the two traditional (and potentially contradictory) aims of history teaching: building a common culture and teaching critical historical thinking. …”
Get full text
Article -
4306
Overview of searchable encryption research
Published 2018-07-01“…With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.…”
Get full text
Article -
4307
An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks
Published 2013-04-01“…While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. …”
Get full text
Article -
4308
-
4309
Whole-genome resequencing landscape of adaptive evolution in Relict gull (Larus relictus)
Published 2025-01-01Get full text
Article -
4310
Analisis Komparatif Keamanan Aplikasi Pengelola Kata Sandi Berbayar Lastpass, 1Password, dan Keeper Berdasarkan ISO/IEC 25010
Published 2023-08-01“…In addition, three applications have the same level of security in securing user data from unauthorized parties, and implement the use of digital signatures or certificates to prevent denial. …”
Get full text
Article -
4311
Blockchain and Artificial Intelligence for Decentralized Edge Environments
Published 2025-01-01“…Edge environments typically involve multiple stakeholders and the management of decentralized devices and resources, presenting significant challenges related to the assurance of data security, real-time processing, and efficient coordination [...]…”
Get full text
Article -
4312
Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions
Published 2024-01-01“…Among the most recurrent themes are IoT and blockchain integration in supply chain management and blockchain in healthcare data management and security, indicating the significant potential of this convergence to transform supply chains and secure healthcare data. …”
Get full text
Article -
4313
High-Risk AI Systems—Lie Detection Application
Published 2025-01-01“…Integrating artificial intelligence into border control systems may help to strengthen security and make operations more efficient. For example, the emerging application of artificial intelligence for lie detection when inspecting passengers presents significant opportunities for future implementation. …”
Get full text
Article -
4314
Deep BiLSTM Attention Model for Spatial and Temporal Anomaly Detection in Video Surveillance
Published 2025-01-01“…Detection of anomalies in video surveillance plays a key role in ensuring the safety and security of public spaces. The number of surveillance cameras is growing, making it harder to monitor them manually. …”
Get full text
Article -
4315
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
Get full text
Article -
4316
Supply risk propagation in international trade networks of the tungsten industry chain
Published 2025-01-01“…The results can provide reference and decision support for different economies to secure the supply security and sustainability of tungsten resources.…”
Get full text
Article -
4317
Analysing the Multidimensional Nature of Poverty: a Focus on Housing Insecurity in South Africa
Published 2024-12-01“…Be that as it may, the Sustainable Development Goals evidently have one critical aspect missing in its 17 goals: achieving housing security for all. Goal 11 mentions urban settlement but fails to understand the concept of housing security. …”
Get full text
Article -
4318
Food-Insecure Women Eat a Less Diverse Diet in a More Temporally Variable Way: Evidence from the US National Health and Nutrition Examination Survey, 2013-4
Published 2019-01-01“…Previous research using food recalls suggests that the total energy intake of food-insecure women is not elevated, though macronutrient composition may differ from that of food-secure women. There is limited evidence on temporal patterns of food consumption. …”
Get full text
Article -
4319
Pressure and rolling torque in high-speed finishing blocks of wire mills with account of mass forces in deformation zones
Published 2001-08-01“…Tasks of working out of theoretical bases of continuos high-speed rolling of rolled wire are set forth and solved with considerańon of influence of mass forces securing necessary acceleration in deformation zones.…”
Get full text
Article -
4320
BRICS in a world at crossroads?
Published 2022-08-01“…In the process, the west has threatened the strategic security of Russia and Russia has also flouted the national sovereignty of its western neighbours that the West tries to use to bring Russia into submission. …”
Get full text
Article