Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
2121
Information technology industry state support as a key problem of ensuring the national security of the Russian Federation
Published 2022-10-01Subjects: Get full text
Article -
2122
-
2123
The Problem of Energy Security in the Early 21st Century: Challenges and Opportunities
Published 2013-02-01Subjects: “…energy security…”
Get full text
Article -
2124
THE DEFINING FEATURES OF SOFT POWER STRATEGY IN GERMAN FOREIGN POLICY
Published 2016-02-01Subjects: Get full text
Article -
2125
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
Published 2013-01-01Subjects: Get full text
Article -
2126
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01Subjects: Get full text
Article -
2127
Research and practice of SRv6 for integrated carrying of video cloud
Published 2019-12-01Subjects: Get full text
Article -
2128
Traffic planning of backbone link of quantum secure communication network
Published 2018-09-01Subjects: “…quantum secure communication network…”
Get full text
Article -
2129
School space as a "safe space" and "secure space": Educational and architectural challenges
Published 2024-01-01Subjects: Get full text
Article -
2130
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
2131
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: “…provable secure…”
Get full text
Article -
2132
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01Subjects: Get full text
Article -
2133
Research on dynamic cooperative technology of manned and unmanned networked information system
Published 2023-07-01Subjects: Get full text
Article -
2134
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
2135
Securing safer care staff: a model for the assessment, selection and training of staff to work in residential care
Published 2006-03-01Subjects:Article -
2136
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Subjects: Get full text
Article -
2137
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01Subjects: Get full text
Article -
2138
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: “…secure and privacy-preserving…”
Get full text
Article -
2139
Generalized 2D polynomial chaotic map and its application in information transmission
Published 2022-09-01Subjects: Get full text
Article -
2140
Trusted storage mechanism of distributed electric energy data based on blockchain
Published 2020-04-01Subjects: Get full text
Article