Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
2261
VALUATION OF DEBT SECURITIES FOR THE OBJECTIVES OF ACCOUNTING REPORTING IN THE RUSSIAN BANK
Published 2017-12-01Subjects: “…debt securities…”
Get full text
Article -
2262
Key working and the quality of relationships in secure accommodation
Published 2013-06-01Subjects:Article -
2263
Securely redundant scheduling policy for MapReduce based on dynamic domains partition
Published 2014-01-01Subjects: Get full text
Article -
2264
-
2265
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01Subjects: “…secure communication…”
Get full text
Article -
2266
Secure supply and demand relationship perception routing in intermittently connected wireless networks
Published 2015-11-01Subjects: Get full text
Article -
2267
Research on trust sensing based secure routing mechanism for wireless sensor network
Published 2017-10-01Subjects: Get full text
Article -
2268
Research progress on secure data deduplication in cloud
Published 2016-11-01Subjects: “…secure deduplication…”
Get full text
Article -
2269
-
2270
Secure lossless transmission of correlated sources over noisy broadcast channel using separate source-channel coding
Published 2013-10-01Subjects: Get full text
Article -
2271
Efficient authentication scheme for double-layer satellite network
Published 2019-03-01Subjects: Get full text
Article -
2272
Privacy cloud storage scheme based on fog computing
Published 2019-03-01Subjects: Get full text
Article -
2273
D. Ricardo’s theory of comparative advantages as applied to interest rate swaps in the financial market
Published 2023-11-01Subjects: Get full text
Article -
2274
Public key searchable encryption scheme in blockchain-enabled multi-user environment
Published 2021-10-01Subjects: Get full text
Article -
2275
New secure distributed secret sharing scheme of n product
Published 2014-11-01Subjects: Get full text
Article -
2276
Research on security multi-party computing based on game theory
Published 2018-01-01Subjects: Get full text
Article -
2277
Research category and future development trend of data elements circulation and security
Published 2024-05-01Subjects: Get full text
Article -
2278
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: Get full text
Article -
2279
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01Subjects: Get full text
Article -
2280
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article