Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
861
Discovering The Significant Potential of Edible Insects In Food, Feed, And Drug Security
Published 2024-11-01Get full text
Article -
862
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: Get full text
Article -
863
BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks
Published 2013-03-01“…Localization is the key supporting technology for wireless sensor networks (WSNs). Security and accuracy are the premise of the localization application. …”
Get full text
Article -
864
The importance of SC UN Resolution 1325 for improving the state of human security
Published 2024-01-01Subjects: Get full text
Article -
865
TRENDS IN GLOBAL TRANSFORMATIONS OF COUNTRIES IN THE CONTEXT OF THEIR DEVELOPMENT AND ENSURING NATIONAL SECURITY
Published 2025-01-01Subjects: “…national and international security…”
Get full text
Article -
866
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01“…As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.…”
Get full text
Article -
867
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01Subjects: Get full text
Article -
868
Secure Pesticide Storage: Essential Structural Features of a Storage Building
Published 2004-10-01Get full text
Article -
869
Cyber Security Intrusion Detection Using a Deep Learning Method
Published 2025-01-01“…The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. …”
Get full text
Article -
870
Modern trends and conceptual approaches to understanding the essence of the concept of “national security”
Published 2022-12-01Subjects: “…national security…”
Get full text
Article -
871
African Crisis Response Initiative and the New African Security (Dis)order
Published 2022-01-01Get full text
Article -
872
Verifiable three-party secure key exchange protocol based on eigenvalue
Published 2019-12-01“…In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However,the validity of key exchange cannot be verified by the scheme,and counterfeiting by middlemen can’t be prevented.Then based on it,the secret matrix was reconstructed,where the matrix order was a large even number,and all the eigenvalues appeared in pairs,similar to the diagonal matrix.Based on the special secret matrix,the verification part which can be used to verify the legitimacy of the communication party was introduced to the scheme,and the verifiable three-party key exchange protocol based on the eigenvalue was given.The protocol not only solved the problem of three-party key exchange,but also verified identity legitimacy.It is proved that it’s feasible to design a three-party key exchange protocol by the eigenvalue.The final protocol is both secure and efficient.…”
Get full text
Article -
873
Performance Analysis of Artificial-Noise-Based Secure Transmission in Wiretap Channel
Published 2024-12-01Subjects: Get full text
Article -
874
Ontology model based on security parameters capturing process for network systems
Published 2017-02-01Subjects: “…security evaluation…”
Get full text
Article -
875
Firearms control as an element of criminological security in the concept of transitional justice for Ukraine
Published 2024-06-01Subjects: Get full text
Article -
876
Factors influencing food security among fishermen households in West Java
Published 2025-01-01“…Background: Food security is a critical component of sustainable development, particularly concerning health and nutrition. …”
Get full text
Article -
877
Novel construction of forward-secure public-key encryption in the standard model
Published 2014-02-01Subjects: Get full text
Article -
878
Public security in the pre-classical political and legal thought of ancient Greece
Published 2022-03-01Subjects: “…public security…”
Get full text
Article -
879
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01Subjects: Get full text
Article -
880
“REDISCOVERY” OF KNOWLEDGE ABOUT THE FUTURE: PERSPECTIVES OF RUSSIA’S SECURITY UP TO 2050
Published 2017-11-01Subjects: Get full text
Article