Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
741
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01Subjects: Get full text
Article -
742
Analysis and Improvement of Key Distribution Scheme for Secure Group Communication
Published 2016-01-01“…In a secure group communication, messages between a group coordinator and members are protected by session keys. …”
Get full text
Article -
743
The Study of Methods for Penetration Testing in Training of Information Security Specialists
Published 2016-12-01“…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
Get full text
Article -
744
Protocol to enhance the security of Early data in TLS 1.3
Published 2017-12-01Subjects: Get full text
Article -
745
METHOD OF MAKING MANAGEMENT DECISION ON FINANCING THE ECONOMIC SECURITY OF ORGANIZATION
Published 2017-01-01Subjects: “…economic security…”
Get full text
Article -
746
Secure Satellite Downlink With Hybrid RIS and AI-Based Optimization
Published 2025-01-01Subjects: Get full text
Article -
747
Security against differential and linear cryptanalysis for general SPT models
Published 2012-01-01“…To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the layer for permutation.The upper bound of the maximum differentia lity was given when the branch number of P was optimal,and the upper bound of the maximum linear approximation probability and the maximum linear hull probability are given when the branch number of P was optimal and when S and T were balanced.As a consequence,the problem about evaluating the security against differential and linear cryptanalysis for general SPT models was resolved partially.…”
Get full text
Article -
748
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
Published 2021-08-01“…For CLEFIA cryptographic structure, a dynamic cryptographic structure was put forward.The main feature of the dynamic cryptographic structure was that the diffusion layer in the 6t(t≥1)th round could be selected arbitrarily from some linear bijection on {0,1}<sup>4</sup>.By analysing the transfer law of 6-round differential characteristic, security evaluation against differential cryptanalysis for all structures of the dynamic cryptographic structure was given.The results show that, under the condition that the round functions are all bijective, there are at least l active round functions for l-round differential characteristic when l is 6k(k≥1) or 6k+1(k≥3), and otherwise there are at least l-1 active round functions for l-round differential characteristic.…”
Get full text
Article -
749
Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities
Published 2025-01-01“…This integration not only enhances the security posture of smart cities but also provides a foundation for future advancements in urban cybersecurity. …”
Get full text
Article -
750
Research on network slicing security for 5G mMTC
Published 2022-02-01“…With the emergence of new 5G business, architecture and technology, more and more researchers pay attention to security issues and potential security risks.Massive machine type communication is one of the three major application scenarios of 5G.It provides high performance such as large connection and low power consumption.Due to factors such as limited resources of MTC equipment, it may also weaken the security of 5G networks.At the same time, different scenarios and applications have obvious demands for network performance, service quality and security level.The flexibility of 5G networking is realized by network slicing technology.It meets the diversity and customization of 5G network services, but also brings new security threats.5G commercial rapid development.The number of IoT devices has increased exponentially.In order to ensure that 5G networks provide more efficient and safe on-demand services, it is particularly important to study the security mechanism and strategy of network slicing for 5G mMTC application scenarios.Therefore, the characteristics and security requirements of 5G mMTC were analyzed.The main security threats of network slicing were listed.In view of the above security requirements and threats, the contribution and deficiency of existing security schemes around the aspects of specific network slice authentication, slice security isolation, security management and arrangement were summarized and expounded.And the future research in this field was prospected.A SM2-based secondary authentication and security isolation model for 5G mMTC network slicing was proposed.This model framework meeted the efficiency of large-scale authentication for 5G devices and users by introducing batch authentication and pre-authentication mechanisms.By hierarchical encryption of different communication data, the security isolation between 5G mMTC network slices was realized.The performance and security of the model were also analyzed.…”
Get full text
Article -
751
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
752
Security of differential phase shift QKD from relativistic principles
Published 2025-01-01“…We then show that security of DPS QKD can be reduced to security of the relativistic protocol. …”
Get full text
Article -
753
Cyber-security governance framework pillars for Zimbabwean local authorities
Published 2025-12-01Subjects: “…Cyber-security…”
Get full text
Article -
754
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01Subjects: Get full text
Article -
755
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01“…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
Get full text
Article -
756
THE LAUNDERING OF CRIMINAL CAPITAL AS A THREAT TO THE SECURITY OF RUSSIA'S ECONOMY
Published 2016-02-01“…Proven link between money laundering and the deterioration of Russia's economic security.…”
Get full text
Article -
757
Internet naming and addressing system security technology and application analysis
Published 2017-03-01Subjects: Get full text
Article -
758
Spectators’ perceptions regarding the security measures taken in soccer stadiums
Published 2023-03-01Subjects: Get full text
Article -
759
Safe and secure classification protocol in two-tiered sensor networks
Published 2015-02-01Subjects: Get full text
Article -
760
Identifying potential threats to economic security in a commercial organization
Published 2023-12-01Subjects: Get full text
Article