Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
261
-
262
Military security in the Arctic: New threats to Russia
Published 2024-11-01Subjects: Get full text
Article -
263
Financial and Legal Regulation of the Security of Economic Activity
Published 2020-06-01Subjects: “…national security…”
Get full text
Article -
264
Research on LEO Satellite Network Routing Security
Published 2023-06-01Subjects: Get full text
Article -
265
Efficient and secure message authentication scheme for VANET
Published 2016-11-01“…The proposed scheme decreased the complexity of cryptographic operations on signature by using elliptic curve cryptosystem (ECC) to construct authentication protocol without bilinear pairing and provided the function of conditional privacy-preserving. Security analysis demonstrated that the proposed scheme satisfies all security and privacy requirements for VANET. …”
Get full text
Article -
266
-
267
A Secure Operational Model for Mobile Payments
Published 2014-01-01“…However, customers’ security concerns are a major barrier to the broad adoption and use of mobile payments. …”
Get full text
Article -
268
Controlled Bidirectional Quantum Secure Direct Communication
Published 2014-01-01“…We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. …”
Get full text
Article -
269
South Africa and Sweden in the UN Security Council
Published 2023-02-01Subjects: Get full text
Article -
270
-
271
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
272
Secure Pesticide Storage: Facility Size and Location
Published 2004-10-01“… This document identifies and answers two basic questions that typically arise when planning to build a secure pesticide storage facility. This document is Fact Sheet PI-29, part of a series from the Pesticide Information Office, Food Science and Human Nutrition Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
273
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: Get full text
Article -
274
Analysis of software defined security model and architecture
Published 2017-06-01Subjects: Get full text
Article -
275
Refugee Protection and Food Security in Kampala, Uganda
Published 2025-01-01Subjects: “…refugees, urban food security, self-settlement, Kampala, Uganda…”
Get full text
Article -
276
ANALYSIS OF GRID-SYSTEMS INFORMATION SECURITY ASPECTS
Published 2016-10-01“…The article presents the analysis of Grid-systems information security aspects, Also, risk assessment methods, using public databases, expert systems and statistical techniques are proposed.…”
Get full text
Article -
277
Security issues and system structure of internet of vehicles
Published 2016-02-01Subjects: Get full text
Article -
278
Research on DNS authoritative server’s performance and security
Published 2006-01-01Subjects: Get full text
Article -
279
Research on secure routing algorithm in satellite networks
Published 2006-01-01Subjects: Get full text
Article -
280
Research on Telecommunication System Business Security Architecture
Published 2013-08-01Subjects: “…telecom system business security…”
Get full text
Article