Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
181
FEATURES OF THE CONCEPT AND CONTENT OF PUBLIC SECURITY
Published 2024-12-01Subjects: “…security; national security; public security; public order; public order; law and order; civil security…”
Get full text
Article -
182
Review of domestic and international financial security
Published 2017-02-01Subjects: “…financial information security…”
Get full text
Article -
183
Shaping the Securities Industry Spatial Pattern by Institutional Arrangements in China: An Analysis Based on Headquarters Location of Securities Companies
Published 2025-01-01Subjects: “…securities industry…”
Get full text
Article -
184
Political discourse, military and securitization of health nexus: contemporary security challenges and the military role in public health security
Published 2020-02-01“…The purpose of this paper is to provide answers to the questions why health is viewed through the lens of national and international security, and what might be the potential role of the armed forces in strategic response to health security challenges. …”
Get full text
Article -
185
Construction of Intensive Security Domain Protection System for Service Platform——Discussion of Security Domain Division and Boundary Integration
Published 2013-08-01Subjects: “…security domain…”
Get full text
Article -
186
Provably secure and efficient proxy signature scheme
Published 2014-08-01“…The random oracles are combined in the scheme and a smaller vector norm blind message is used to control the dimension of proxy signature secret key. The security of proposed scheme is based on the hardness of shortest vector problem and small integer solution problem, and the scheme satisfies the security require-ments of a proxy signature scheme. …”
Get full text
Article -
187
Research on secure DPC localization algorithm of WSN
Published 2011-01-01Subjects: Get full text
Article -
188
Differential security evaluation of Piccolo-like structure
Published 2022-02-01“…In order to diversify the design of block cipher, Piccolo-like structure was proposed with principles of design.Security evaluation for Piccolo-like structure against differential cryptanalysis was deeply studied.By studying the input-output propagation characteristics of differential characteristics, the lower bound on the number of active round functions for arbitrary round Piccolo-like structure was given.The results show that, under the condition that the round functions are all bijective, there are at least l active round functions for l-round Piccolo-like structure if l≥6, and there are at least l-1 active round functions for l-round Piccolo-like structure if l is 1,2,3,4,5.…”
Get full text
Article -
189
SOCIOLOGY OF KNOWLEDGE SECURITY IN THE DIGITAL EDUCATIONAL SPACE
Published 2020-05-01Subjects: Get full text
Article -
190
RETRACTED: The warning and security system of the multifunctional complex
Published 2024-01-01Get full text
Article -
191
Ukraine’s debt security in the context of military conflict
Published 2023-09-01Subjects: “…state debt security…”
Get full text
Article -
192
An Analysis of Security System for Intrusion in Smartphone Environment
Published 2014-01-01“…(b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.…”
Get full text
Article -
193
GLOBALISATION AND THE PERPETUITY OF POVERTY IN THE CONTEMPORARY SECURITY ENVIRONMENT
Published 2024-12-01Subjects: “…soft security…”
Get full text
Article -
194
EPN:encryption padding for NTRU with provable security
Published 2008-01-01Subjects: Get full text
Article -
195
Securing guarantee of the blockchain network:attacks and countermeasures
Published 2021-01-01Subjects: “…blockchain security…”
Get full text
Article -
196
Health security—Why is ‘public health’ not enough?
Published 2025-01-01Subjects: “…Health security…”
Get full text
Article -
197
WAGES OF THE TEACHER AS A FACTOR IN THE ECONOMIC SECURITY
Published 2017-03-01“…Teacher salary level is regarded as one of the factors that have a significant impact on the security of modern society.…”
Get full text
Article -
198
Wireless and Mobile Networks: Security and Privacy Issues
Published 2017-01-01Get full text
Article -
199
Multicast Encryption Infrastructure for Security in Sensor Networks
Published 2009-01-01Get full text
Article -
200
Key working and the quality of relationships in secure accommodation
Published 2013-06-01Subjects:Article