Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
621
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications
Published 2013-07-01Get full text
Article -
622
Study on security routing algorithm based on dynamic adjacent trust
Published 2013-06-01Subjects: Get full text
Article -
623
Fairtrade, Food Security and Globalization: Building Alternative Food Systems
Published 2016-05-01Subjects: Get full text
Article -
624
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article -
625
Design of security verification platform for the integrated space-ground network
Published 2016-08-01Subjects: Get full text
Article -
626
A mutual authentication security scheme for mobile NFC devices
Published 2017-08-01Subjects: Get full text
Article -
627
Security mechanism in access control based on non-cooperative game
Published 2014-11-01“…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
Get full text
Article -
628
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
629
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: “…secure and privacy-preserving…”
Get full text
Article -
630
Neighbourhood, crime and fear: Exploring subjective perception of security in Serbia
Published 2025-01-01Subjects: “…security…”
Get full text
Article -
631
Cooperative secure transmission against collusive eavesdroppers in Internet of Things
Published 2020-06-01“…As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. …”
Get full text
Article -
632
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
Published 2020-01-01“…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
Get full text
Article -
633
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Published 2013-01-01“…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
Get full text
Article -
634
The Role of Basic Infrastructure to Strengthen Economic Security in Eastern Indonesia
Published 2024-08-01“…Increasing agricultural productivity has positive implications for Indonesia's food and economic security. Investment in water infrastructure development is needed to support leading sectors.…”
Get full text
Article -
635
A Critical Review of A New Framework for Analysis of Security
Published 2018-01-01Subjects: “…security…”
Get full text
Article -
636
Virtual Cloud Laboratories in Training of Specialists of the Direction “Computer Security”
Published 2015-12-01Get full text
Article -
637
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Published 2014-01-01“…We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.…”
Get full text
Article -
638
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
639
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: Get full text
Article -
640
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article