Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3101
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. …”
Get full text
Article -
3102
Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ
Published 2021-04-01“…This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. …”
Get full text
Article -
3103
Debt load impact on sustainable development of Russian regions
Published 2024-12-01“…The authors of the study faced the following tasks: to conduct a comparative assessment of regional sustainable development and debt load, to consider the directions for effective management of the load as an element of economic security of the constituent entities, as well as to analyze the economic essence and peculiarities of formation of the Russian regions’ public debt. …”
Get full text
Article -
3104
The Neglected Traditional Enset (Ensete ventricosum) Crop Landraces for the Sustainable Livelihood of the Local People in Southern Ethiopia
Published 2022-01-01“…Enset (Ensete ventricosum, Musaceae) is a neglected traditional multipurpose crop plant critical for Ethiopian food security. It has drawn a lot of attention in the last few years. …”
Get full text
Article -
3105
Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare
Published 2015-10-01“…The first mechanism provides secure submission of health-related observations into a hospital information system, whereas the second mechanism enables secure short-term sharing of observations without storage.…”
Get full text
Article -
3106
The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food
Published 2014-09-01“…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
Get full text
Article -
3107
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix
Published 2024-01-01“…The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.…”
Get full text
Article -
3108
A Group Mining Method for Big Data on Distributed Vehicle Trajectories in WAN
Published 2015-08-01Get full text
Article -
3109
Prioritizinghydrological erosion-prone response units in Latyan catchment
Published 2015-12-01“…Soil erosion in watersheds, causing problems such as the loss of agricultural land productivity and reduce soil surface layer, endangering the life of reservoirs and water utilities, loss of soil fertility, increasing flood, threatening human food security, etc. The negative effects of soil erosion, watershed management operations to improve care. …”
Get full text
Article -
3110
Perspectives of Turkish foreign policy based on analysis of Romanian documents
Published 2024-09-01“…The Treaty of Lausanne and then the Treaty of Montreux were vital – in the first – for the security of the new Turkish state, but also for the states bordering the Black Sea. …”
Get full text
Article -
3111
Use of biological control agents for managing fungal pathogens in Solanaceae crops: progress and future perspectives—a review
Published 2025-01-01“…Abstract The growing global population has intensified concerns about food security, making it essential to produce crops sustainably to meet increasing demands without harming the environment. …”
Get full text
Article -
3112
Nearly Quadratic n-Derivations on Non-Archimedean Banach Algebras
Published 2012-01-01Get full text
Article -
3113
Advancement of Nanofibrous Mats and Common Useful Drug Delivery Applications
Published 2022-01-01Get full text
Article -
3114
SCondi: A Smart Context Distribution Framework Based on a Messaging Service for the Internet of Things
Published 2014-01-01“…The context channel provides a pluggable filter mechanism that supports effective extraction, tailoring, authentication, and security of information.…”
Get full text
Article -
3115
THE POLITICS OF APPOINTING POLITICAL AND CARREER DIPLOMATS’ IN NIGERIA: Understanding the Nexus
Published 2023-12-01“…However, it requires legislative (Senate) confirmation and security clearance. The paper recommends that the Nigerian government need to review the application of federal character principle and quota system in the appointment of ambassadors. …”
Get full text
Article -
3116
Espaces de l’insécurité : réalités territoriales et réponses locales à la délinquance
Published 2014-07-01“…It thus questioned the relevance of the résidentialist paradigm (that is to say, the assumption of a crime would depend in form and intensity of urban, sociological , economic and demographic patterns and trends) and its impact on work organization and missions of law enforcement forces, but also all the local actors involved in security policy and crime prevention. At the level of Midi-Pyrénées, this contribution will give synthetically to know which transformations frameworks and patterns of public policies could emerge in the decade 2000-2010, in different situations, but all with a common element: the need to respond to situations perceived by local actors as risky or dangerous for the safety of citizens.…”
Get full text
Article -
3117
REGIONS OF RUSSIA IN THE CORONAVIRUS PANDEMIC
Published 2020-12-01“…At the present stage of development, taking into account the changed economic situation in the world, the issues of economic security of the regions are of particular importance. …”
Get full text
Article -
3118
20th Anniversary of 9-11: Corporate Disaster Preparedness, Lessons Learned, and Ways Forward
Published 2021-08-01“…This paper deals with security crisis and disaster management and some effective approaches companies should take to deal with these issues. …”
Get full text
Article -
3119
Dynamic Analysis of Traffic State and Congestion Propagation on Bidirectional Grid Network
Published 2013-01-01Get full text
Article -
3120
Control system for aquatic biological resources in the Northern fisheries basin of Russia
Published 2022-01-01“…It has been determined that the allocation of aquatic biological resources for industrial fishing is managed on the basis of Russian regulatory legal acts, and the implementation of the tasks of developing the fishery sector and ensuring the country’s food security is consistent with the implementation of the Basic State Policy of Russia. …”
Get full text
Article