Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
661
A secure method of voting and planning based on quadratic voting
Published 2025-02-01“…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
Get full text
Article -
662
Ubiquitous Systems towards Green, Sustainable, and Secured Smart Environment
Published 2015-01-01Get full text
Article -
663
Physical layer security for the air-space-ground communication networks
Published 2018-03-01Subjects: Get full text
Article -
664
STATISTICAL ANALYSIS THE FOOD SECURITY OF THE RUSSIAN FEDERATION IN THE REGIONAL CONTEXT
Published 2017-02-01Subjects: “…food security…”
Get full text
Article -
665
Forward-secure ciphertext-policy attribute-based encryption scheme
Published 2014-07-01Subjects: “…forward-secure…”
Get full text
Article -
666
Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories
Published 2024-06-01“…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
Get full text
Article -
667
Methodology and software development for auditing information security management systems
Published 2022-12-01Subjects: Get full text
Article -
668
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
669
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01Subjects: Get full text
Article -
670
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article -
671
Analysis of Terminal Security Issue and Solution in Mobile Internet Era
Published 2014-12-01Subjects: Get full text
Article -
672
Provably secure partially blind signature without trusted PKG
Published 2010-01-01“…The proposed scheme satisfies security properties: correctness and partial blindness. …”
Get full text
Article -
673
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01“…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
Get full text
Article -
674
The Security Needs of International Students: An Analysis in Terms of the Securitization Theory
Published 2023-06-01“…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
Get full text
Article -
675
Research on construction technology of artificial intelligence security knowledge graph
Published 2023-04-01Subjects: “…artificial intelligence security…”
Get full text
Article -
676
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
677
New secure distributed secret sharing scheme of n product
Published 2014-11-01Subjects: Get full text
Article -
678
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks
Published 2013-06-01“…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
Get full text
Article -
679
The National Police of Ukraine activities in the sphere of ensuring national security
Published 2023-07-01Subjects: Get full text
Article -
680
IMPACT ASSESSMENT OF NIGERIA POLICE FORCE ON THE SECURITY MAINTANANCE IN NIGERIA
Published 2024-06-01Subjects: “…Security…”
Get full text
Article