Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
841
Secure outsource computing scheme of modular exponentiation based on single server
Published 2018-01-01“…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
Get full text
Article -
842
Problems of the Use of Private Military and Security Companies in the US military operations
Published 2010-06-01Get full text
Article -
843
Data update algorithm based on secure network coding in cloud environment
Published 2017-05-01“…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
Get full text
Article -
844
Lightweight authentication protocol for security vehicle network of railway freight train
Published 2018-11-01Subjects: Get full text
Article -
845
Climate change, economic security, and macroeconomic stability: Insights from the EU
Published 2025-01-01“…This research examines the impact of climate change risks on the macroeconomic situation and the security of the economic system in the EU-27 during the 2002-2020 period. …”
Get full text
Article -
846
A blockchain-based secure path planning in UAVs communication network
Published 2025-02-01Subjects: Get full text
Article -
847
TRANS-BORDER TRAJECTORIES AND HUMAN SECURITY IN NIGERIA: NORTHEAST AND NORTHWEST IN PERSPECTIVE
Published 2023-12-01Subjects: Get full text
Article -
848
The Russian Federation subjects budgets as a financial basis for their economic security
Published 2022-11-01Subjects: Get full text
Article -
849
Secure Pesticide Storage: Essential Structural Features of a Storage Building
Published 2004-10-01Get full text
Article -
850
Endogenous Security for the Space-Integrated-Ground Information Network in 6G
Published 2023-06-01Subjects: “…cyberspace endogenous security…”
Get full text
Article -
851
Discussion on Key Issue of Batch Testing About the Security of Mobile Application
Published 2014-12-01Subjects: “…security of mobile application…”
Get full text
Article -
852
HERDSMEN AND FARMERS CLASHES IN NORTH CENTRAL NIGERIA: NATIONAL SECURITY IMPLICATIONS
Published 2024-07-01“…This paper examines the national security implications of herdsmen and farmers conflict on Nigerian national security. …”
Get full text
Article -
853
To the problem of optimization of criteria for evaluating the effectiveness of providing the national security of the State
Published 2022-03-01Subjects: Get full text
Article -
854
Secure RSSI-based node positioning mechanism for wireless sensor networks
Published 2012-07-01Subjects: Get full text
Article -
855
Research on national security risk assessment model of open government data
Published 2020-12-01“…As an important strategic resource of national and social development,the government open data is of great value.But China lack standards in the security risk assessment of government open data,especially the security of national data is at risk.Based on the theory of information security risk assessment,a government open data security risk assessment model was constructed with national security assets,open data vulnerability and security threat as the main security risk elements.Analytic hierarchy process (AHP) and fuzzy comprehensive evaluation methods were used to quantify and evaluate the security risks of government open data,and the validity of the model is verified by example.…”
Get full text
Article -
856
RETHINKING CLIMATE CHANGE AND NATIONAL SECURITY: IMPLICATIONS FOR SUSTAINABLE DEVELOPMENT IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
857
Eavesdropping against wireless spatial scrambling secure communication: hyperplane clustering
Published 2014-04-01Subjects: “…physical-layer security…”
Get full text
Article -
858
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01Subjects: “…secure communication…”
Get full text
Article -
859
A reference measurement framework of software security product quality (SPQNFSR)
Published 2021-01-01Subjects: Get full text
Article -
860
HUMAN RIGHTS AND NATIONAL SECURITY: FRANCE IN SEARCH OF THE RESOLUTION OF THE MIGRATION CRISIS
Published 2018-07-01Subjects: Get full text
Article