Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
361
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
362
Improving the level of food security of the region: cluster approach
Published 2021-10-01Subjects: “…economic security…”
Get full text
Article -
363
Formal modeling and analyzing method for database security policy
Published 2015-09-01Subjects: Get full text
Article -
364
Challenges of Gender Policy Implementation in the Security and Defense Sector
Published 2020-09-01“…The authors of the article have studied the problems of ensuring the principles of gender equality in the free trade sector of the security and defense sector. Aspects of gender equality have a special role in ensuring the educational process, managing the free economic zone and overcoming stereotyping of society, especially in the security and defense sector. …”
Get full text
Article -
365
Information Security Risk Management Model for Big Data
Published 2022-01-01“…The essence of information security management is risk management, which is closely related to each other. …”
Get full text
Article -
366
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01Subjects: “…security domain…”
Get full text
Article -
367
A Study on the Security Algorithm for Contexts in Smart Cities
Published 2014-06-01“…However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. …”
Get full text
Article -
368
RETRACTED: Main directions of ensuring food security in the regions
Published 2024-01-01Get full text
Article -
369
Methodology of Creation and Structure of the Corporate Information Security Unit
Published 2022-11-01Subjects: Get full text
Article -
370
Formation of the System of Threats to Energy Security of the Republic of Belarus
Published 2019-08-01Subjects: “…energy security…”
Get full text
Article -
371
Multilevel secure access control policy for distributed systems
Published 2017-08-01Subjects: Get full text
Article -
372
Securing Bird Feeders from Florida Black Bears
Published 2017-05-01“…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
Get full text
Article -
373
COOPERATION BETWEEN RUSSIA AND BAHRAIN IN THE FIELD OF REGIONAL SECURITY
Published 2017-11-01Subjects: Get full text
Article -
374
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01Subjects: Get full text
Article -
375
POVERTY AND NATIONAL SECURITY: AN OVERVIEW OF NIGERIA’S FOURTH REPUBLIC
Published 2024-07-01Subjects: “…National Security…”
Get full text
Article -
376
John Lewis Gaddis. Surprise, Security and the American Experience.
Published 2006-04-01Get full text
Article -
377
HIPSCS:secure IP communication system based on HIP
Published 2012-11-01Subjects: Get full text
Article -
378
Provable secure ownership transfer protocol for RFID tag
Published 2015-08-01“…With the ownership transfer of an object,the ownership of the RFID tag attached to it also needs to be transferred.Security and privacy are the key issues while researchers studying the process of RFID tag ownership transfer.In the UC(universally composable)framework,an ideal functionality of RFID tag ownership transfer is formally defined.Then,a novel lightweight ownership transfer protocol for RFID tag is proposed.Subsequently,it is proved that proposed protocol realizes the previously defined ideal functionality and satisfies the required security properties such as mutual authentication,tag anonymity,resistance to de-synchronization attacks,forward privacy protection and backward privacy protection.Compared with the existing ownership transfer protocols for RFID tags,the computational complexity and the storage requirements of proposed protocol are all lower.Meanwhile,the number of interaction among the entities is small.Therefore,the proposed protocol can efficiently implement ownership transfer for low-cost tags.…”
Get full text
Article -
379
Secure P2P Data Storage and Maintenance
Published 2010-01-01“…P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings; yet they do not address the security and cooperation issues raised by self-organization. …”
Get full text
Article -
380
Research on Space-Ground Network Security Guarantee Technology
Published 2020-09-01Subjects: “…space-ground network security guarantee…”
Get full text
Article