Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1581
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01Subjects: “…physical layer security…”
Get full text
Article -
1582
-
1583
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
Published 2024-12-01“…Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. …”
Get full text
Article -
1584
The effects of outdated data and outliers on Kenya’s 2019 Global Food Security Index score and rank
Published 2023-03-01Get full text
Article -
1585
A Long Shadow of World War II: Development of the National Security Concept in the United States
Published 2020-11-01Subjects: Get full text
Article -
1586
Contradictions of Collective Security Model: Modern Historiography on the Evolution of the Versailles System of International Relations in the 1930s
Published 2022-05-01Subjects: “…collective security…”
Get full text
Article -
1587
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01“…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
Get full text
Article -
1588
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
1589
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…Security has become one of the important factors for any network communication and transmission of data packets. …”
Get full text
Article -
1590
Oral Health Status and Anxiety Level Amongst the Borderline Security Force Personnel and Their Family Members
Published 2025-02-01“…The primary role of border security personnel is to safeguard borders against illegal trans-border activities during peacetime and provide military support during wartime. …”
Get full text
Article -
1591
Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture
Published 2023-03-01“…To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was proposed.A blockchain was maintained by trusted authorities of different trust domains.A modified ciphertext-policy attribute-based encryption scheme was adopted to encrypt data, and encrypted data was stored in interplanetary file system (IPFS) with relevant information recorded on the blockchain, constructing a fine-grained and secure cross-domain data sharing scheme based on blockchain.A verification algorithm for cross-domain access based on the garbled Bloom filter was designed, and a smart contract executed fast decryption tests based on access policies on the blockchain, improving the access efficiency of a mass of ciphertext.A cross-domain data access method based on outsourcing decryption was designed, and the trusted authorities transformed ciphertexts while performing outsourcing decryption with complex bilinear pairing calculations, reducing the time overhead of vehicle decryption.Experiment results show that the proposed scheme is superior to other schemes in the process of cross-domain ciphertext transformation and vehicle decryption, and the cross-domain data access efficiency is increased by 60% on average.…”
Get full text
Article -
1592
The Association of Food Security With Hypertensive Disorders of Pregnancy: A National Health Interview Survey Analysis
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
1593
Exploring offshore wind’s potential to enhance energy security in nations with limited land and fuel resources
Published 2025-01-01Subjects: Get full text
Article -
1594
The Relationship between Russian Identity and Political Polarization: The Role of Secure National Identification and National Narcissism
Published 2025-01-01“…</strong>To analyse the relationship between secure national identification and national narcissism with political polarization (intergroup differentiation between people with different political views). …”
Get full text
Article -
1595
The effectiveness of monitoring as a necessary condition for the adoption of correct decisions on the security оf technosphere
Published 2020-04-01Subjects: “…security оf technosphere…”
Get full text
Article -
1596
Design scheme of physical layer security for intelligent reflecting surface-assisted MISO communication system
Published 2022-01-01Subjects: Get full text
Article -
1597
An Efficient and Hybrid Deep Learning-Driven Model to Enhance Security and Performance of Healthcare Internet of Things
Published 2025-01-01“…However, H-IoT devices present security and Quality of Service (QoS) concerns because of their critical nature, complexity, and dynamic features, which make them incompatible with conventional network topologies. …”
Get full text
Article -
1598
Industrial Pipe-Rack Health Monitoring System Based on Reliable-Secure Wireless Sensor Network
Published 2012-10-01“…However, for the application of WSN technology in large-scale industrial plants, issues of reliability and security should be fully addressed, and an industrial sensor network standard that mitigatesthe problem of compatibilitywith legacy equipment and systems should be established. …”
Get full text
Article -
1599
A Bibliometric Analysis of Agent-Based Systems in Cybersecurity and Broader Security Domains: Trends and Insights
Published 2025-01-01Subjects: Get full text
Article -
1600
Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer
Published 2017-06-01“…In this article, we investigate the physical layer security problem in relay wireless sensor networks with simultaneous wireless information and power transfer. …”
Get full text
Article