Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1001
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01“…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. …”
Get full text
Article -
1002
The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking
Published 2017-01-01“…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. In this scenario, security and privacy have become the decisive factors. …”
Get full text
Article -
1003
Grid chaotic attractors based on arc tangent and its secure communication
Published 2014-12-01Subjects: Get full text
Article -
1004
Information security of minors: individual subjects of the Russian Federation organization experience
Published 2023-02-01Subjects: “…information security…”
Get full text
Article -
1005
Trends, challenges and solutions of digital information security in Central and Eastern Europe
Published 2024-06-01Subjects: “…digital information security…”
Get full text
Article -
1006
MECHANISMS FOR ENSURING SUSTAINABLE DEVELOPMENT AND FOOD SECURITY OF A SOVEREIGN COUNTRY
Published 2020-05-01“…The problems of food security and tasks aimed at preventing internal and external threats, sustainable development of domestic production sufficient to ensure food independence and state sovereignty have been considered.…”
Get full text
Article -
1007
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01“…Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. …”
Get full text
Article -
1008
Cyber security and need to change the model of monitoring fraud and financial crime
Published 2020-01-01Subjects: Get full text
Article -
1009
ORGANIZATIONAL - METHODICAL FEATURES OF EVELUATING THE EFFECTIVENESS OF SUSTEMS ECONOMIC SECURITY THE FIRM
Published 2016-03-01“…The study revealed the main methods of ensuring the economic security of the organization, their characteristics and differences from other management techniques. …”
Get full text
Article -
1010
EVOLUTION OF CONFLICT STUDIES IN THE INTERNATIONAL SECURITY CONTEXT IN POST-SOVIET RUSSIA
Published 2016-10-01Subjects: Get full text
Article -
1011
Quantum secure communication algorithm based on cyclic code and information compression
Published 2020-03-01Subjects: Get full text
Article -
1012
RETHINKING CLIMATE CHANGE AND NATIONAL SECURITY: IMPLICATIONS FOR SUSTAINABLE DEVELOPMENT IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
1013
Cold War in Space: Reconnaissance Satellites and US-Soviet Security Competition
Published 2023-07-01Get full text
Article -
1014
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
Published 2016-05-01“…To improve such an issue, this paper proposes a secure but efficient scheme for resource constrained things. …”
Get full text
Article -
1015
Wireless Mesh network secure routing mechanism based on dynamic reputation
Published 2019-04-01“…Aiming at the problem that the wireless Mesh network (WMN) security routing mechanism was scarce and internal malicious nodes drop data packets during data transmission,a secure routing mechanism based on dynamic reputation (SRMDR) for wireless Mesh network was proposed.Firstly,the dynamic reputation mechanism was used to evaluate the node’s behavior,the node’s comprehensive reputation value was calculated according to the node’s direct reputation value and the recommended reputation value,and the node’s dynamic reputation value was calculated according to the node’s historical comprehensive reputation value and the current comprehensive reputation value.Then,the dynamic reputation was combined with the routing mechanism to establish secure routing paths,the nodes with a dynamic reputation value less than the threshold were determined to be malicious nodes,which were isolated during the routing process.Experimental results show that compared with HWMP and SHaRP,SRMDR has higher malicious node recognition rates,and SRMDR can effectively reduce packet loss rate and improve network throughput.…”
Get full text
Article -
1016
EFFECT OF PERCEIVED EASE OF USE AND SECURITY OF E-BANKING ON CUSTOMER SATISFACTION
Published 2022-12-01Subjects: Get full text
Article -
1017
Theories and Practices of Societal Security in the Scandinavian Countries: A Comparative Analysis
Published 2024-12-01Subjects: Get full text
Article -
1018
Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility
Published 2004-10-01“… This document identifies and discusses three key features of a pesticide storage facility's interior that, in combination, promote both worker safety and pesticide container security. This document is Fact Sheet PI-31, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
1019
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01“…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
Get full text
Article -
1020
Security Analysis of Image Scrambling Cipher Based on Compound Chaotic Equation
Published 2021-01-01“…As digital image has become one of the most important forms of expression in multimedia information, the security of digital image has become a concern. Because of its large amount of data and high redundancy, there are many security hidden dangers in ordinary image encryption methods. …”
Get full text
Article