Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1261
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01Subjects: Get full text
Article -
1262
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
Published 2019-06-01Subjects: Get full text
Article -
1263
Eucalyptus-based livelihoods: enhancing household food security and resilience in Northwest Ethiopia
Published 2025-02-01“…Farmers in northwest Ethiopia have been transforming their livelihood strategies, however, the impact of this transformation on food security status and resilience is hardly investigated. …”
Get full text
Article -
1264
Monitoring Brazilian Food Security Based on Emergy Concepts: A Proposed Approach
Published 2024-12-01“…This study enhances the discussion on food security by examining trade equity between food consumers and the supply chain from an emergy perspective. …”
Get full text
Article -
1265
Secure privacy-preserving record linkage system from re-identification attack.
Published 2025-01-01“…Our method's efficacy was validated through simulations on the Titanic and North Carolina Voter Records (NCVR) datasets, demonstrating a substantial reduction in re-identification rates. Security analysis confirms that our zero-relationship encoding effectively preserves privacy against graph-based re-identification threats, improving PPRL technology's security.…”
Get full text
Article -
1266
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Published 2021-10-01Subjects: Get full text
Article -
1267
THE UN SECURITY COUNCIL ACTING ON SYRIA IN THE CONTEXT OF EMERGING MULTIPOLARITY OF INTERNATIONAL RELATIONS
Published 2018-02-01Subjects: Get full text
Article -
1268
-
1269
Production of Rice in Nigeria: The Role of Indian-Nigerian Bilateral Cooperation in Food Security
Published 2020-07-01“…The paper concludes that the agreements, particularly the one of 2017, have further promoted, strengthened and expanded rice production in the context of food security, job creation and saving foreign exchange. …”
Get full text
Article -
1270
RETRACTED: Machine learning as an integral part of the security strategy of production business processes
Published 2024-01-01Get full text
Article -
1271
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
Published 2010-10-01“…Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. …”
Get full text
Article -
1272
Pakistan’s Water Security Crisis: Challenges and the Case for Integrated Water Resource Management
Published 2025-01-01Subjects: Get full text
Article -
1273
Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability
Published 2014-01-01Get full text
Article -
1274
Robust dead-beat synchronization of discrete chaotic systems and application to secure communications
Published 2008-01-01Subjects: Get full text
Article -
1275
Research on fusion model based on deep learning for text content security enhancement
Published 2020-05-01Subjects: “…content security…”
Get full text
Article -
1276
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01Subjects: Get full text
Article -
1277
UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database
Published 2015-10-01Subjects: “…information security…”
Get full text
Article -
1278
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01“…A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in outsourcing computation.A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations.It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method.It also improves the verification effciency and reduces the complexity of space.The performance analysis shows that the scheme is highly efficient.…”
Get full text
Article -
1279
Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
Published 2013-11-01“…Therefore, how to realize digital media security effectively is becoming a challenging problem. …”
Get full text
Article -
1280
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article