Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
2281
-
2282
Secure transmission for NOMA downlink based on short packet communication
Published 2021-02-01Subjects: Get full text
Article -
2283
Wireless quantum power distribution system based on wireless
Published 2020-02-01Subjects: “…quantum secure communication…”
Get full text
Article -
2284
Deep Reinforcement Learning-Based Anti-Jamming Approach for Fast Frequency Hopping Systems
Published 2025-01-01Subjects: Get full text
Article -
2285
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01Subjects: Get full text
Article -
2286
-
2287
Strategic Stability: Dynamics and Factors of Transformation
Published 2023-03-01Subjects: Get full text
Article -
2288
Official and Public Dialogue in Lithuania-Russia Relationships: in Search of Communicative Solutions
Published 2015-10-01Subjects: Get full text
Article -
2289
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: Get full text
Article -
2290
Controllability design of a memristive hyperchaotic map and the construction of optical fiber secure communication system
Published 2024-04-01Subjects: Get full text
Article -
2291
Determinants of readiness to implement forensic patient-oriented research: a study of barriers and facilitators in a high-secure hospital
Published 2025-01-01Subjects: Get full text
Article -
2292
The Influence of Personality Traits on Household Financial Decisions: Evidence from 31 European Countries
Published 2025-01-01Subjects: Get full text
Article -
2293
Research on the privacy-preserving point-in-polygon protocol
Published 2016-04-01Subjects: Get full text
Article -
2294
Universally composable secure multiparty computation protocol with fairness
Published 2014-02-01Subjects: Get full text
Article -
2295
RISKS OF LOSING CONTROLLABILITY WHILE LIBERALIZING THE ELECTRIC POWER INDUSTRY
Published 2015-06-01Subjects: Get full text
Article -
2296
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
2297
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: Get full text
Article -
2298
Quantum secure communication algorithm based on cyclic code and information compression
Published 2020-03-01Subjects: Get full text
Article -
2299
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01Subjects: “…secure learned image codec…”
Get full text
Article -
2300
The Role of Infrastructure Projects of European Central Bank in Development of Financial Integration in EU
Published 2012-02-01Subjects: Get full text
Article