Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
221
Analysis and Practice of Cloud Computing Information Security
Published 2013-02-01Subjects: Get full text
Article -
222
Regional security of Turkey in the context of the Kurd problem
Published 2010-02-01Get full text
Article -
223
-
224
Method of designing security protocol for remote attestation
Published 2008-01-01“…By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability.…”
Get full text
Article -
225
European Security Architecture: Global and Regional Perspective
Published 2011-10-01Get full text
Article -
226
Analysis and improvement of sensor networks security protocol
Published 2011-01-01Subjects: Get full text
Article -
227
-
228
Theoretical Aspects of Analysis of International Environmental Security
Published 2015-10-01“…Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. …”
Get full text
Article -
229
Provably secure rational delegation computation protocol
Published 2019-07-01Subjects: Get full text
Article -
230
Study on the Key Technologies of Smartphone Application Security
Published 2013-05-01Subjects: “…mobile phone security…”
Get full text
Article -
231
PHILOSOPHICAL AND SOCIOCULTURAL DIMENSIONS OF PERSONALITY PSYCHOLOGICAL SECURITY
Published 2018-12-01Subjects: “…security…”
Get full text
Article -
232
On the Road to Euro-Atlantic and Eurasian Security Community
Published 2012-10-01Get full text
Article -
233
Established interpretive practice on social security contributions
Published 2023-03-01Subjects: Get full text
Article -
234
Data security for internet plus in public cloud
Published 2017-10-01“…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
Get full text
Article -
235
Development trends of the information technology and cyberspace security
Published 2015-12-01Subjects: Get full text
Article -
236
Survey on industrial control protocol security research
Published 2024-06-01Subjects: Get full text
Article -
237
-
238
-
239
NATO and Energy Security: 25 Years in the Making
Published 2024-12-01Subjects: Get full text
Article -
240
Digitalization of business increases the costs of information security
Published 2020-04-01Subjects: “…information security…”
Get full text
Article