Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
461
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Published 2016-01-01“…Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. …”
Get full text
Article -
462
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
463
A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
Published 2014-01-01“…Software security defects have a serious impact on the software quality and reliability. …”
Get full text
Article -
464
Concept of effective Control among the Means of Restoring National Security of Ukraine
Published 2021-07-01Subjects: Get full text
Article -
465
Data-Driven Social Security Event Prediction: Principles, Methods, and Trends
Published 2025-01-01Subjects: Get full text
Article -
466
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Published 2011-01-01“…Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. …”
Get full text
Article -
467
TVD‐PB logic circuit based on camouflaging circuit for IoT security
Published 2022-01-01“…A logic camouflaging circuit is proposed that uses a balanced power consumption and threshold voltage‐defined technique to provide an antiphysical attack scheme to protect the hardware security for IoT devices. The proposed circuit uses a symmetric differential pull‐down network in implementing the different logic functions through the threshold voltage reconfiguration circuit. …”
Get full text
Article -
468
International Experience in Assessing Economic Security: Basic Approaches and Opportunities for Ukraine
Published 2020-06-01Subjects: Get full text
Article -
469
Military medicine and morale: Perceptions of inequities in triage impact national security
Published 2024-09-01Get full text
Article -
470
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Published 2014-01-01“…Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
Get full text
Article -
471
A Secure RFID Authentication Protocol Adopting Error Correction Code
Published 2014-01-01“…RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. …”
Get full text
Article -
472
Identifying and Ranking Security Indicators in Online Social Networks with an MADM Technique
Published 2022-11-01Subjects: Get full text
Article -
473
A data pipeline for secure extraction and sharing of social determinants of health.
Published 2025-01-01“…<h4>Discussion and conclusion</h4>We describe a novel pipeline that can facilitate the secure acquisition and sharing of neighborhood-level SDOH without sharing PHI. …”
Get full text
Article -
474
THE NEXUS BETWEEN ARMED CONFLICT, SECURITY, PEACE EDUCATION AND DEVELOPMENT IN NIGERIA
Published 2023-09-01“… This paper examines the interconnection between armed conflict, security, education, peace, and development in Nigeria. …”
Get full text
Article -
475
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
476
Constructing RBAC Based Security Model in u-Healthcare Service Platform
Published 2015-01-01“…In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. …”
Get full text
Article -
477
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01“…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. …”
Get full text
Article -
478
The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking
Published 2017-01-01“…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. In this scenario, security and privacy have become the decisive factors. …”
Get full text
Article -
479
Information security of minors: individual subjects of the Russian Federation organization experience
Published 2023-02-01Subjects: “…information security…”
Get full text
Article -
480
MECHANISMS FOR ENSURING SUSTAINABLE DEVELOPMENT AND FOOD SECURITY OF A SOVEREIGN COUNTRY
Published 2020-05-01“…The problems of food security and tasks aimed at preventing internal and external threats, sustainable development of domestic production sufficient to ensure food independence and state sovereignty have been considered.…”
Get full text
Article