Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
641
Adaptively secure key-policy ABE scheme with fast decryption
Published 2014-11-01Subjects: Get full text
Article -
642
Detection of Illegal Movement in Radioactive Material Transportation Security Systems
Published 2021-01-01Get full text
Article -
643
NIGERIAN YOUTH UNEMPLOYMENT AND SECURITY ISSUES: EVALUATING THE ENTREPRENEURSHIP OPTION
Published 2024-05-01Subjects: “…Security Challenger…”
Get full text
Article -
644
Scaling up Sustainable Agriculture and Food Security With Nanoscience and Technology
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
645
Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things
Published 2015-08-01“…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
Get full text
Article -
646
The Security of Student Information Management System Based upon Blockchain
Published 2022-01-01“…This article aims to study the security of the student information management system based on the blockchain. …”
Get full text
Article -
647
Environmental and Socio-Political Security Risks Correlation in Mountainous Areas
Published 2025-01-01Subjects: Get full text
Article -
648
Literature Review of Machine Learning and Threat Intelligence in Cloud Security
Published 2025-01-01Subjects: Get full text
Article -
649
SPECIFICS TAIL RISKS THAT THREATEN ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS
Published 2017-02-01Subjects: Get full text
Article -
650
Ritual as mechanism for securing life and averting evil among the Krobo
Published 2008-06-01“…Two of the many functions of rituals are to secure blessings from the deity or to ward off evil. …”
Get full text
Article -
651
Security risk analysis of power 5G hybrid networking
Published 2022-01-01Subjects: Get full text
Article -
652
Research of Fragment Mechanism Security in IPv6 Network Protocol
Published 2013-10-01Subjects: “…IPv6 network security…”
Get full text
Article -
653
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: Get full text
Article -
654
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01“…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
Get full text
Article -
655
A Forward-Secure Digital Signature Based on Elliptic Curve
Published 2015-10-01Subjects: “…forward-secure…”
Get full text
Article -
656
Reputation-Based Secure Sensor Localization in Wireless Sensor Networks
Published 2014-01-01“…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
Get full text
Article -
657
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01Subjects: Get full text
Article -
658
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
659
UK in European Security: New Opportunities or a Path to Nowhere?
Published 2015-04-01Subjects: Get full text
Article -
660
Big data architecture analysis and data security fusion technology
Published 2020-07-01Subjects: Get full text
Article