Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
461
Development of industrial internet platform and its security challenges
Published 2020-03-01Subjects: Get full text
Article -
462
Robust image hiding algorithm for secure multimodal biometrics
Published 2016-09-01“…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
Get full text
Article -
463
A Novel FM-DCSK Secure Communication System
Published 2015-01-01Subjects: “…chaos secure communication…”
Get full text
Article -
464
Research on IMS Core Network Security Index System
Published 2014-08-01Subjects: Get full text
Article -
465
Research on relay related handover security in LTE-A
Published 2013-08-01Subjects: Get full text
Article -
466
Secure cross-domain communication mechanism for Web mashups
Published 2012-06-01“…Many methods were used in cross-domain communication,whereas they were hardly to meet the security and high performance requirements.To this end,a secure cross-domain communication(SCDC)mechanism was proposed for Web mashups.It encapsulates content from different trust domains as secure components,achieves cross-domain communication with layered communication stack,and shares fine-grained objects by wrapping objects.SCDC mechanism supports secure cross-domain communication,shares objects between mashups and components without any browser modifications.Experiments show that the mechanism improves the communication efficiency more than five-fold,and only incurs limited overhead.…”
Get full text
Article -
467
Increasing the contribution of personal gardening to providing food security
Published 2022-11-01Subjects: Get full text
Article -
468
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
469
Status of water security in inland South African cities
Published 2020-12-01Subjects: “…Water demand, Water security, South Africa, Water supply…”
Get full text
Article -
470
Research of public infrastructure system and security policy in cyberspace
Published 2021-12-01“…Considering the key elements, such as object, resources, activities, and other equipment, as same as system, data, environmental and other aspects of demand, the public infrastructure system and security policy between physical space and cyberspace were taken as a basic point.A scientific system of public infrastructure in cyberspace was constructed.From the perspective of dual authentication of management authentication and application authentication, some corresponding safety policies and implementation suggestions were given from the aspects of user/device management and identity authentication.…”
Get full text
Article -
471
Sustainable intensification of agriculture: the foundation for universal food security
Published 2025-01-01“…To achieve universal food security, SI must be accompanied by complementary investments in market infrastructure, postharvest stewardship, healthy diets, and social protection. …”
Get full text
Article -
472
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
473
Secure and transparent data aggregation for wireless sensor networks
Published 2012-10-01Subjects: Get full text
Article -
474
Military-political Processes in the Caucasus Region and the Security of Russia
Published 2015-06-01Subjects: Get full text
Article -
475
Legal regulation of national security in Ukraine: today’s challenges
Published 2022-06-01Subjects: “…security…”
Get full text
Article -
476
Framework for Secure Wireless Communication in Wireless Sensor Networks
Published 2013-12-01“…With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. …”
Get full text
Article -
477
Information Security Risk Framework for Digital Transformation Technologies
Published 2025-01-01Get full text
Article -
478
Network security situation awareness technology in smart substation
Published 2015-12-01Subjects: Get full text
Article -
479
Securing Bird Feeders from Florida Black Bears
Published 2017-05-01“…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
Get full text
Article -
480
The influence of moral and ethical aspects on the organisation’s economic security
Published 2022-04-01Subjects: Get full text
Article