Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
241
Combined strategies for managing the securities portfolio structure
Published 2024-04-01Subjects: “…securities portfolio…”
Get full text
Article -
242
Survey of the Internet of things operating system security
Published 2018-03-01Subjects: Get full text
Article -
243
-
244
Provable secure trusted protocol for network storage
Published 2011-01-01Subjects: “…provable security…”
Get full text
Article -
245
Research progress of chaotic secure optical communication
Published 2020-03-01Subjects: Get full text
Article -
246
EFFECT OF E-GOVERNANCE POLICY ON SECURITY IN NIGERIA
Published 2024-10-01Subjects: “…Security…”
Get full text
Article -
247
Representation model of structured document for multilevel security
Published 2012-09-01Subjects: Get full text
Article -
248
Security analysis on a kind of group signatures
Published 2003-01-01“…In this paper, we show there are still some security leaks in these schemes, and give some methods of forgery attack.…”
Get full text
Article -
249
-
250
EU Assistance to Third Countries in Peacekeeping and Security
Published 2012-02-01Get full text
Article -
251
Co-Secure Domination Number in Some Graphs
Published 2024-12-01Subjects: “…co-secure dominating set…”
Get full text
Article -
252
Security and Privacy in Metaverse: A Comprehensive Survey
Published 2023-06-01“…We then identify and discuss more potential critical security and privacy issues that can be caused by combining the four characteristics. …”
Get full text
Article -
253
-
254
Service-oriented security framework for datacenter networks
Published 2018-01-01Subjects: Get full text
Article -
255
The concept of interethnic security of the region (on the example of Tatarstan)
Published 2023-08-01“…An indicator of unstable security is an increase intension. Subjectively, security is expressed in the absence of fear of external threats [1]. …”
Get full text
Article -
256
Secure fault-tolerant code for cloud storage
Published 2014-03-01“…A secure regenerating code,called SRCS was proposed to solve the security problem during the process of the fault-tolerant of storage systems,especially the storage system in an extremely open environment such as cloud computing and cloud storage.SRCS achieves the security of the encoding matrix in the regenerating code using the threshold public-key encryption with low redundancy and high efficiency.It is proven that SRCS is secure in the semi-adaptive model using decisional BDHE assumption.…”
Get full text
Article -
257
Secure Pesticide Storage: Facility Size and Location
Published 2004-10-01“… This document identifies and answers two basic questions that typically arise when planning to build a secure pesticide storage facility. This document is Fact Sheet PI-29, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
258
-
259
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: “…information security…”
Get full text
Article -
260
WiFi and WiMAX Secure Deployments
Published 2010-01-01“…In this article, we present the security characteristics for the WiFi and the WiMAX networks. …”
Get full text
Article