Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
441
Quantum information course for the undergraduate students of cyber security
Published 2019-06-01Subjects: Get full text
Article -
442
Robust deployment strategy for security data collection agent
Published 2019-06-01Subjects: Get full text
Article -
443
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01Subjects: Get full text
Article -
444
Turkey's National Security Perceptions in the Early Republican Period
Published 2022-12-01Get full text
Article -
445
A Secure and Fair Joint E-Lottery Protocol
Published 2014-01-01“…In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. The players can check the lottery integrity, and the winning numbers can be verified publicly.…”
Get full text
Article -
446
Security sharing scheme for encrypted data in cloud storage
Published 2015-10-01“…With the convenient of storing and sharing data in cloud storage environment,the concerns about data security arised as well.To achieve data security on untrusted servers,user usually stored the encrypted data on the cloud storage environment.How to build a cipertext-based access control scheme became a pot issue.For the access control problems of ciphertext in cloud storage environment,a CP-ABE based data sharing scheme was proposed.Novel key generation and distribution strategies were proposed to reduce the reliance on a trusted third party.Personal information was added in decryption key to resistant conclusion attacks at the same time.Moreover,key revocation scheme was proposed to provide the data backward secrecy.The security and implement analysis proves that proposed scheme is suit for the real application environment.…”
Get full text
Article -
447
Geopolitical choice of the national security ideology: the example of Ukraine
Published 2023-04-01Subjects: Get full text
Article -
448
Meaning and Vision of Mimic Computing and Mimic Security Defense
Published 2014-07-01Subjects: Get full text
Article -
449
Ensuring Security for the Participants of Criminal Proceedings: Forensic Aspects
Published 2020-12-01Subjects: Get full text
Article -
450
Legal aspects of functional security standardisation of the Internet of Things
Published 2023-09-01Subjects: Get full text
Article -
451
Data fusion protocol with source security for sensor networks
Published 2010-01-01Subjects: Get full text
Article -
452
METHODICAL APPROACHES TO THE DEVELOPMENT OF THE ECONOMIC SECURITY INDICATORS OF THE ORGANIZATION
Published 2018-11-01Subjects: “…economic security…”
Get full text
Article -
453
Secure interface architecture for the software defined system on wafer
Published 2024-10-01Subjects: Get full text
Article -
454
Research on coreference resolution technology of entity in information security
Published 2020-02-01Subjects: Get full text
Article -
455
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: Get full text
Article -
456
Social financial information security risk analysis and prevention
Published 2016-03-01Subjects: Get full text
Article -
457
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
458
Security of the deployment of SDN-based IoT using blockchain
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
459
Correction: A lightweight and secure protocol for teleworking environment.
Published 2024-01-01Get full text
Article -
460
Energy-saving privacy data secure aggregation method
Published 2014-11-01Subjects: Get full text
Article