Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1341
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: “…5G security…”
Get full text
Article -
1342
Evaluation of the policy program for strengthening local food commodities for sustainable food security in papua
Published 2024-06-01Subjects: Get full text
Article -
1343
-
1344
Water management for rice production: a key component of food security in East Africa
Published 2025-02-01“…Abstract Water is a valuable resource for rice production, which is an integral component of food security in East Africa (EA). Rice farming is expanding in the region, with up to 90% produced on smallholder farms using traditional flooding and rain-fed methods, vulnerable to climate change and variability. …”
Get full text
Article -
1345
-
1346
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
Get full text
Article -
1347
Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
Published 2020-03-01“…In order to ensure data security for deduplication, different data should be assigned with different privacy levels. …”
Get full text
Article -
1348
Legal Certainty Regarding the Conversion of Land Certificates To An Electronic System Based On Security Principles
Published 2024-11-01Subjects: “…security guarantee,…”
Get full text
Article -
1349
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
Published 2019-06-01Subjects: “…cyberspace security…”
Get full text
Article -
1350
Concepts and types of administrative and legal means of ensuring economic security by the National Police of Ukraine
Published 2018-12-01“…The conducted research should become the basis for studying the problems of certain administrative and legal means of ensuring economic security by the National Police of Ukraine, which is a perspective direction for further scientific research.…”
Get full text
Article -
1351
DIGITAL SECURITY IN EDUCATIONAL TRAINING PROGRAMS: A STUDY BASED ON FUTURE TEACHERS’ PERCEPTIONS
Published 2023-06-01Subjects: Get full text
Article -
1352
Social leadership and authority in the field of national and military security: problems of formation in the digital world
Published 2021-04-01Subjects: Get full text
Article -
1353
Wireless body area network: Architecture and security mechanism for healthcare using internet of things
Published 2025-01-01“…The data generated by small sensor devices need strong security methods for secure transmission over a public network. …”
Get full text
Article -
1354
Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks
Published 2015-01-01“…In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. …”
Get full text
Article -
1355
A plithogenic statistical approach to digital security measures and emotional health in childhood and adolescence
Published 2024-11-01Subjects: Get full text
Article -
1356
-
1357
UN SECRETARY-GENERAL NORMATIVE CAPABILITY TO INFLUENCE THE SECURITY COUNCIL DECISION-MAKING PROCESS
Published 2016-12-01Subjects: Get full text
Article -
1358
Unified operation monitoring and security warning platform based on big data in energy group
Published 2018-05-01“…With the increasing of information assets of energy group,in order to effectively cope with information security risks,using the big data and the intersecting confirmation mechanics of multi-source data,a monitoring and security warning platform was designed for information devices and application systems in energy group.By the global analysis of big multi-source data,the real-time awareness of risk and situation could be achieved,which was valuable for the progress of operation and management level of information system and timely warning of the spread of information risk to the power system.…”
Get full text
Article -
1359
-
1360
A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
Published 2012-09-01“…In this paper, after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme, we present an efficient public auditing scheme with privacy property. The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.…”
Get full text
Article