Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Management 3
- Data protection 2
- Handbooks, manuals, etc 2
- Prevention 2
- Biotechnology 1
- Bioterrorism 1
- Cyberterrorism 1
- Digital watermarking 1
- Family policy 1
- Hospitality industry 1
- Hotels 1
- Humanitarian assistance 1
- Intellectual property infringement 1
- Laboratories 1
- Life sciences 1
- Medical care, Cost of 1
- Mobile communication systems 1
- Mobile computing 1
- Multimedia systems 1
- National security 1
- Non-governmental organizations 1
- Old age assistance 1
- Politics and government 1
- Population 1
- Restaurants 1
- Risk assessment 1
- Risk management 1
-
1
Method of Secure Domain Creation for Multiple Points in Home Networking
Published 2015-11-01Subjects: Get full text
Article -
2
Co-Secure Domination Number in Some Graphs
Published 2024-12-01Subjects: “…co-secure dominating set…”
Get full text
Article -
3
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01Subjects: Get full text
Article -
4
Hubungan Secure Attachment Orang Tua dengan Penyesuaian Diri pada Siswa SMP Islamic Boarding School
Published 2022-10-01Subjects: Get full text
Article -
5
Research on the anti-synchronization chaos system group &large scale distributed system security communication
Published 2017-07-01Subjects: “…secure communication…”
Get full text
Article -
6
Integrasi Audit dan Teknik Clustering untuk Segmentasi dan Kategorisasi Aktivitas Log
Published 2024-02-01Subjects: Get full text
Article -
7
Secure medical image transmission for healthcare applications using cooperative relaying based on physical layer security
Published 2024-09-01Subjects: “…secure image transmission…”
Get full text
Article -
8
-
9
Analisis Burnout Programmer Terhadap Penerapan Secure Coding
Published 2024-08-01Subjects: Get full text
Article -
10
R~2BAC:a risk-based multi-domain secure interoperation model
Published 2008-01-01Subjects: Get full text
Article -
11
Discussion on Key Issue of Batch Testing About the Security of Mobile Application
Published 2014-12-01Subjects: Get full text
Article -
12
Secure RSSI-based node positioning mechanism for wireless sensor networks
Published 2012-07-01Subjects: Get full text
Article -
13
Synchronization of hyperchaos of cellular neural network with applications to secure communication
Published 2000-01-01Subjects: Get full text
Article -
14
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01Subjects: Get full text
Article -
15
HIPSCS:secure IP communication system based on HIP
Published 2012-11-01Subjects: Get full text
Article -
16
Analysis on the status and development of quantum secure communication standardization
Published 2018-01-01Subjects: Get full text
Article -
17
Reconstruction of BLP model based on secure subject access
Published 2007-01-01Subjects: Get full text
Article -
18
Resource optimization of secure energy efficiency based on mmWave massive MIMO-NOMA system with SWIPT
Published 2020-08-01Subjects: Get full text
Article -
19
Secure two-party line segments intersection scheme and its application in privacy-preserving convex hull intersection
Published 2013-01-01Subjects: Get full text
Article -
20
Lightweight and secure search scheme for medical data sharing
Published 2024-11-01Subjects: Get full text
Article