Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
681
A survey of attack and defense on human-computer interaction security
Published 2019-10-01“…With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer interaction security attacks frequently occur.The status of four kinds of human-computer interaction technologies:HID-USB,fingerprint recognition,speech recognition and face recognition,as well as the offensive and defensive benefits were reviewed and analyzed,and the research direction of human-computer interaction security in the future was discussed.At the same time,some suggestions were given.…”
Get full text
Article -
682
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Subjects: Get full text
Article -
683
A New Data Coding Algorithm for Secure Communication of Image
Published 2024-11-01“…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
Get full text
Article -
684
Formal Security in the Works of Legal Scholars of Pre-Soviet Period
Published 2021-07-01Subjects: “…formal security…”
Get full text
Article -
685
Research on security multi-party computing based on game theory
Published 2018-01-01Subjects: Get full text
Article -
686
Management technologies of cyberspace endogenous safety and security test site
Published 2021-03-01Subjects: “…endogenous safety and security…”
Get full text
Article -
687
Game model based security strategy of heterogeneous controllers in the cloud
Published 2018-09-01Subjects: Get full text
Article -
688
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
Get full text
Article -
689
Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor
Published 2019-12-01Subjects: “…euro-atlantic security system…”
Get full text
Article -
690
Military and political security in the Arctic before and amidst the Ukrainian crisis
Published 2024-11-01Subjects: Get full text
Article -
691
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01Get full text
Article -
692
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01“…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
Get full text
Article -
693
Exploring the dynamics of energy security and energy poverty in the Andean basin
Published 2025-12-01Subjects: “…Energy security…”
Get full text
Article -
694
LEGAL MIGRATION – RIGHTS AND BENEFITS IN THE EUROPEAN SOCIAL SECURITY SYSTEM
Published 2024-12-01Subjects: Get full text
Article -
695
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01“…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
Get full text
Article -
696
The War in Ukraine, Agricultural Trade and Risks to Global Food Security
Published 2022-06-01“…Abstract Any calls to move towards a centrally planned economy or autarky are strongly advised against, as this would only be to the detriment of food security in the Global South.…”
Get full text
Article -
697
Changing role of security alliances in the post-Cold War era
Published 2024-07-01“…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
Get full text
Article -
698
Communication and Security Integrated Space-Earth Heterogeneous Network Architecture
Published 2020-12-01Subjects: Get full text
Article -
699
Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications
Published 2024-01-01“…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
Get full text
Article -
700
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Subjects: “…border gateway protocol security…”
Get full text
Article