Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
21
Research and practice of SRv6 for integrated carrying of video cloud
Published 2019-12-01Subjects: Get full text
Article -
22
Traffic planning of backbone link of quantum secure communication network
Published 2018-09-01Subjects: “…quantum secure communication network…”
Get full text
Article -
23
School space as a "safe space" and "secure space": Educational and architectural challenges
Published 2024-01-01Subjects: Get full text
Article -
24
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
25
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: “…provable secure…”
Get full text
Article -
26
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01Subjects: Get full text
Article -
27
Research on dynamic cooperative technology of manned and unmanned networked information system
Published 2023-07-01Subjects: Get full text
Article -
28
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
29
Securing safer care staff: a model for the assessment, selection and training of staff to work in residential care
Published 2006-03-01Subjects:Article -
30
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Subjects: Get full text
Article -
31
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01Subjects: Get full text
Article -
32
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: “…secure and privacy-preserving…”
Get full text
Article -
33
Generalized 2D polynomial chaotic map and its application in information transmission
Published 2022-09-01Subjects: Get full text
Article -
34
Trusted storage mechanism of distributed electric energy data based on blockchain
Published 2020-04-01Subjects: Get full text
Article -
35
A Forward-Secure Digital Signature Based on Elliptic Curve
Published 2015-10-01Subjects: “…forward-secure…”
Get full text
Article -
36
Research of authentication techniques for the Internet of things
Published 2020-07-01Subjects: Get full text
Article -
37
Analysis and improvement of a password-based authenticated key exchange protocol
Published 2010-01-01Subjects: Get full text
Article -
38
A Novel FM-DCSK Secure Communication System
Published 2015-01-01Subjects: “…chaos secure communication…”
Get full text
Article -
39
A Novel Secure Routing Protocol——Multi-Next Hop Routing Protocl Based on Node Potential
Published 2014-07-01Subjects: “…secure routing…”
Get full text
Article -
40
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: “…security model…”
Get full text
Article