Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1201
APPROACH TO ECONOMIC SECURITY ORGANIZATION BASED ON PROBLEM-SOLVING TYPE CLOSED CIRCLE
Published 2016-07-01Subjects: “…economic security of organization…”
Get full text
Article -
1202
Design and Implementation of an Ethical AI-Based Teaching Assistant for IoT Security Education
Published 2024-12-01Subjects: Get full text
Article -
1203
Quantitative Research on Water Security in Zhengzhou City Based on SD-BC Theory
Published 2020-01-01Subjects: Get full text
Article -
1204
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
1205
Legal regulation features of legal liability of the Bureau of Economic Security of Ukraine employees
Published 2023-09-01Subjects: Get full text
Article -
1206
Designing a security-oriented leadership model of Mazandaran University of Medical Sciences
Published 2024-11-01Subjects: “…security-oriented…”
Get full text
Article -
1207
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…However, TES is facing critical challenges in security and economics. Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
Get full text
Article -
1208
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01“…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
Get full text
Article -
1209
Risk factors for human infection with mpox among the Mexican population with social security
Published 2025-01-01Get full text
Article -
1210
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
1211
Secure Two-Party Decision Tree Classification Based on Function Secret Sharing
Published 2023-01-01“…This paper proposes a novel framework for secure two-party decision tree classification that enables collaborative training and evaluation without leaking sensitive data. …”
Get full text
Article -
1212
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Published 2025-01-01Get full text
Article -
1213
Wireless sensor network for fire detection with network coding to improve security and reliability
Published 2025-02-01“…This article proposes a wireless sensor network (WSN) for fire alarm systems that leverages network coding to enhance system reliability and security. The proposed WSN is designed to comply with European standards, with a particular focus on German standards, and enables the deployment of sensor nodes that automatically construct a robust and reliable network. …”
Get full text
Article -
1214
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: “…beyond birthday‐bound security…”
Get full text
Article -
1215
IMPACT OF ELECTRONIC RECORDS MANAGEMENT SYSTEM ON THE SECURITY OF RECORDS AMONG ADMINISTRATIVE STAFF
Published 2023-12-01Subjects: Get full text
Article -
1216
The India-US Security and Defense Cooperation under Narendra Modi: Challenges and Assessments
Published 2024-12-01Subjects: Get full text
Article -
1217
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks
Published 2014-01-01“…This paper proposes a novel secure data aggregation scheme based on homomorphic primitives in WSNs (abbreviated as SDA-HP). …”
Get full text
Article -
1218
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01“…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
Get full text
Article -
1219
FROM THE VIEW OF THE COMMUNIST PARTY OF VIETNAM TO THE PRACTICE OF BUILDING SOCIAL SECURITY IN DANANG
Published 2017-12-01“…This article analyzes the views of the Communist Party of Vietnam on social security implementation in the current period; Analyzes the situation of social security in Danang and thereby suggests some solutions to improve social security for people in Danang city today.…”
Get full text
Article -
1220
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01Get full text
Article