Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
101
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
Published 2014-07-01Subjects: Get full text
Article -
102
Incorporating “Security” in Sustainable Development Goals (SDG): Insights from Food Security and Climate Change
Published 2025-01-01Subjects: Get full text
Article -
103
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: “…security analysis…”
Get full text
Article -
104
Analysis of Cooperative Defense System of Water Conservancy Network Security Based on Software Defined Security
Published 2023-01-01Subjects: “…software defined security…”
Get full text
Article -
105
An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks
Published 2016-11-01“…In this study, a security testing method based on security levels is proposed for wireless sensor networks. …”
Get full text
Article -
106
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01Subjects: Get full text
Article -
107
Security in the Realm of Social Justice: From Processes to the Emergence A Critical Look at Justice and National Security
Published 2018-09-01Subjects: Get full text
Article -
108
On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
Published 2018-01-01“…However, we found that the CL scheme is subject to sensor capture attack which breaks the session key security of the CL scheme. An improved protocol is proposed to fix this problem.…”
Get full text
Article -
109
Perancangan Spesifikasi Keamanan untuk Pengembangan Aplikasi Secure Chat Berdasarkan Common Criteria For It Security Evaluation
Published 2021-11-01“…This means that security features in some chat applications are developed not based on security specification designs. …”
Get full text
Article -
110
Secure medical image transmission for healthcare applications using cooperative relaying based on physical layer security
Published 2024-09-01Subjects: “…secure image transmission…”
Get full text
Article -
111
Household water security is a mediator of household food security in a nationally representative sample of Mexico
Published 2025-01-01“… Abstract Objective: Explore the relationship between water insecurity (WI) and food security and their covariates in Mexican households. …”
Get full text
Article -
112
Overview of retail investment instruments of the Russian economy
Published 2024-11-01Subjects: Get full text
Article -
113
Water Diplomacy and Non-Traditional Security
Published 2025-01-01“… The water scarcity crisis in Iraq has become a non-traditional security issue that threatens the country's social, political and economic stability. …”
Get full text
Article -
114
-
115
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01“…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
Get full text
Article -
116
-
117
Research on the Solution of Business Platform Security
Published 2013-08-01Subjects: “…business platform security…”
Get full text
Article -
118
-
119
-
120
Emerging international regime of information security
Published 2021-11-01Subjects: “…international information security…”
Get full text
Article