Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
81
Design of shuffling protocol based on additive secret sharing
Published 2024-08-01Subjects: Get full text
Article -
82
Multi-dimensional secure query scheme for fog-enhanced IIoT
Published 2020-08-01Subjects: Get full text
Article -
83
Research and practice on data center security architecture refactoring based on intelligent service chain
Published 2024-11-01Subjects: Get full text
Article -
84
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: “…secure comparison…”
Get full text
Article -
85
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
Published 2022-01-01Subjects: Get full text
Article -
86
Aerial reconfigurable intelligent surfaces-assisted full-duplex UAV secure communication
Published 2024-07-01Subjects: “…UAV secure communication…”
Get full text
Article -
87
Key working and the quality of relationships in secure accommodation
Published 2013-06-01Subjects:Article -
88
-
89
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01Subjects: “…secure communication…”
Get full text
Article -
90
Secure supply and demand relationship perception routing in intermittently connected wireless networks
Published 2015-11-01Subjects: Get full text
Article -
91
Research on trust sensing based secure routing mechanism for wireless sensor network
Published 2017-10-01Subjects: Get full text
Article -
92
Delay and energy minimization for MEC-based secure communication
Published 2020-11-01Subjects: Get full text
Article -
93
Research progress on secure data deduplication in cloud
Published 2016-11-01Subjects: “…secure deduplication…”
Get full text
Article -
94
Secure lossless transmission of correlated sources over noisy broadcast channel using separate source-channel coding
Published 2013-10-01Subjects: Get full text
Article -
95
Efficient authentication scheme for double-layer satellite network
Published 2019-03-01Subjects: Get full text
Article -
96
Privacy cloud storage scheme based on fog computing
Published 2019-03-01Subjects: Get full text
Article -
97
Research and design in dual network scheme of power corporation based on network isolation and secure data exchange
Published 2017-02-01Subjects: Get full text
Article -
98
Public key searchable encryption scheme in blockchain-enabled multi-user environment
Published 2021-10-01Subjects: Get full text
Article -
99
New secure distributed secret sharing scheme of n product
Published 2014-11-01Subjects: Get full text
Article -
100
Research on security multi-party computing based on game theory
Published 2018-01-01Subjects: Get full text
Article