Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1041
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
Published 2019-01-01“…On the contrary, IoT has various security and privacy concerns for the end users that limit its proliferation. …”
Get full text
Article -
1042
Improvement on the XTP public key cryptosystem and communication protocol of provable security
Published 2007-01-01Subjects: Get full text
Article -
1043
Access control security model based on behavior in cloud computing environment
Published 2012-03-01“…In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.…”
Get full text
Article -
1044
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01Subjects: “…data security…”
Get full text
Article -
1045
Assessing National and Military Security of Russia: Established Procedure and How to Improve It
Published 2020-11-01Subjects: “…national security…”
Get full text
Article -
1046
Predictive Policing and Enhancing Security Performance through Artificial Intelligence Applications
Published 2024-12-01“…This paper stress the importance of leveraging predictive technologies to foster preparedness, resilience, and security in an increasingly interconnected world. By modernizing infrastructures and embracing AI-driven strategies, nations can navigate the complexities of the digital era effectively, paving the way for sustainable progress and global stability.…”
Get full text
Article -
1047
Research on credit card transaction security supervision based on PU learning
Published 2023-06-01Subjects: Get full text
Article -
1048
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article -
1049
ASSESSMENT OF SECURITY RISKS TO CRITICAL INFRASTRUCTURE WITHIN THE NATIONAL MINING SUBSECTOR
Published 2022-12-01Subjects: Get full text
Article -
1050
Secure Pesticide Storage: Using and Managing a Pesticide Storage Facility
Published 2004-10-01“…Revised: November 2004. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
1051
Synchronization of chaotic optomechanical system with plasmonic cavity for secured quantum communication
Published 2025-01-01“…Our findings pave the way for enhanced coherence and reliability in secure quantum communication systems, thus contributing to the advancement of this rapidly evolving field.…”
Get full text
Article -
1052
Application of the Gordon Loeb model to security investment metrics: a proposal
Published 2024-12-01Subjects: Get full text
Article -
1053
A Security Data Forwarding Mechanism for Sparse Social Sensor Networks
Published 2015-08-01Get full text
Article -
1054
Malicious attack-resistant secure localization algorithm for wireless sensor network
Published 2016-12-01Subjects: Get full text
Article -
1055
The Problem of Energy Security in the Early 21st Century: Challenges and Opportunities
Published 2013-02-01Subjects: “…energy security…”
Get full text
Article -
1056
A Secure Image Encryption Algorithm Based on Rubik's Cube Principle
Published 2012-01-01“…These encryption algorithms typically use relatively small key spaces and thus offer limited security, especially if they are one-dimensional. In this paper, we proposed a novel image encryption algorithm based on Rubik's cube principle. …”
Get full text
Article -
1057
Formation of psychological security of the educational environment (on the example of the school in the Altai Republic)
Published 2020-12-01Subjects: Get full text
Article -
1058
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: “…provably secure…”
Get full text
Article -
1059
Analytical skills of computer security students in the structure of analytical thinking readiness
Published 2015-11-01Subjects: Get full text
Article -
1060
Security capability analysis of software-based heterogeneous redundant execution system
Published 2021-09-01Subjects: Get full text
Article