Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2121
-
2122
-
2123
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
Published 2020-01-01“…The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP. …”
Get full text
Article -
2124
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01“…A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. …”
Get full text
Article -
2125
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01“…A lightweight cryptographic design is required for securing the data revolving around constrained devices. …”
Get full text
Article -
2126
-
2127
Quantum algorithms for enhanced educational technologies
Published 2025-01-01“…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
Get full text
Article -
2128
Study on the Properties and Pest Control Effects of Five Common Wheat Flour Packaging Materials
Published 2025-01-01Get full text
Article -
2129
Qualified Digital Ecosystems As an Academic Information System Framework in The Industrial 4.0
Published 2024-12-01“…The research also utilizes ISO 9126 and ISO/IEC 25010 quality models to establish usability and security standards, while the Academic Information System Quality Instrument (AISQI) is introduced to evaluate system performance. …”
Get full text
Article -
2130
Blockchain-IoT Healthcare Applications and Trends: A Review
Published 2024-01-01“…Integrating blockchain technology with IoT extensively helps provide basic security requirements owing to the built-in security structure of the blockchain. …”
Get full text
Article -
2131
-
2132
Investigation the Citizen\'s Satisfaction from the elements of sense of belonging (Case study: Golha Residential Complex of Rasht)
Published 2022-09-01“…Nowadays, the lack of attachment is a significant point in the construction of towns, which is demonstrated with criteria such as lack of environmental attraction and visual qualities, lack of readability, security, and so on. These factors will affect people's relationship with the environment around them and thus their satisfaction. …”
Get full text
Article -
2133
-
2134
Urban Sustainability Based on Citizens’ Participation (Case Study - the City of Sabzevar)
Published 2013-05-01“…Reliability coefficient for all items was 0.89 and for all dimensions was more than 0.72 except for the sense of social security dimension. Variables in this research included age, years of residence in the city/neighborhood, education, ownership of residential house, citizen's participation in city affairs management, social interactions, and the citizens’ opinion about social security, and life satisfaction. …”
Get full text
Article -
2135
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01“…Abstract Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. It is challenging to implement a scalar multiplication (SM) operation which has the highest computational complexity in ECC. …”
Get full text
Article -
2136
-
2137
-
2138
Fiscal Decentralisation and Services Delivery in Mbarara Central Market.
Published 2024“…Although fiscal decentralization is often promoted as a means to enhance local governance and improve service provision, its actual impact on security, sanitation, and utility services is not well understood. …”
Get full text
Thesis -
2139
-
2140
Whole-genome resequencing landscape of adaptive evolution in Relict gull (Larus relictus)
Published 2025-01-01Get full text
Article