Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
2141
A Forward-Secure Digital Signature Based on Elliptic Curve
Published 2015-10-01Subjects: “…forward-secure…”
Get full text
Article -
2142
Combined strategies for managing the securities portfolio structure
Published 2024-04-01Subjects: “…securities portfolio…”
Get full text
Article -
2143
Research of authentication techniques for the Internet of things
Published 2020-07-01Subjects: Get full text
Article -
2144
Analysis and improvement of a password-based authenticated key exchange protocol
Published 2010-01-01Subjects: Get full text
Article -
2145
A Novel FM-DCSK Secure Communication System
Published 2015-01-01Subjects: “…chaos secure communication…”
Get full text
Article -
2146
A Novel Secure Routing Protocol——Multi-Next Hop Routing Protocl Based on Node Potential
Published 2014-07-01Subjects: “…secure routing…”
Get full text
Article -
2147
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article -
2148
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: “…provably secure…”
Get full text
Article -
2149
Adaptive Security Solutions for NOMA Networks: The Role of DDPG and RIS-Equipped UAVs
Published 2024-11-01Subjects: “…non-orthogonal multiple access, reconfigurable intelligent surface, unmanned aerial vehicles, deep reinforcement learning, deep deterministic policy gradient, physical layer security.…”
Get full text
Article -
2150
Modern Conflicts Features in Latin America. The Role of the OAS in the Settlement of the Falklands Conflict
Published 2015-02-01Subjects: Get full text
Article -
2151
“Simplifying” Digital Complexity? A Socio-Technical Perspective. Editorial Introduction to Issue 33 of CSIMQ
Published 2022-12-01Subjects: Get full text
Article -
2152
Transformation of the fuel and energy complex to ensure Russia’s energy security in the era of sanctions restrictions
Published 2023-11-01Subjects: Get full text
Article -
2153
Social and humanitarian policy of Ukraine in the conditions of war
Published 2024-06-01Subjects: Get full text
Article -
2154
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
2155
A survey of physical layer security in space-air-ground communication and networks
Published 2020-09-01Subjects: Get full text
Article -
2156
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach
Published 2025-01-01Subjects: Get full text
Article -
2157
AGRICULTURAL SECTOR DEVELOPMENT WITHIN THE «UKRAINE FACILITY» PROGRAM
Published 2024-05-01Subjects: “…food security, agricultural market, agricultural land market, institutional foundations of agricultural production, sustainable development of rural areas, register of agricultural producers, irrigation sector.…”
Get full text
Article -
2158
Tactical measures set to improve the import substitution process in the field of Russian pharmaceuticals
Published 2023-06-01Subjects: Get full text
Article -
2159
Russia–EU energy dialogue in 2000–2014: Key priorities, stages, contradictions, and outcomes
Published 2022-10-01Subjects: Get full text
Article -
2160
sThing: A Novel Configurable Ring Oscillator Based PUF for Hardware-Assisted Security and Recycled IC Detection
Published 2025-01-01Subjects: “…Hardware-assisted security (HAS)…”
Get full text
Article