Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
641
Research of Fragment Mechanism Security in IPv6 Network Protocol
Published 2013-10-01Subjects: “…IPv6 network security…”
Get full text
Article -
642
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: Get full text
Article -
643
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01“…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
Get full text
Article -
644
A Forward-Secure Digital Signature Based on Elliptic Curve
Published 2015-10-01Subjects: “…forward-secure…”
Get full text
Article -
645
Reputation-Based Secure Sensor Localization in Wireless Sensor Networks
Published 2014-01-01“…In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. …”
Get full text
Article -
646
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01Subjects: Get full text
Article -
647
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
648
UK in European Security: New Opportunities or a Path to Nowhere?
Published 2015-04-01Subjects: Get full text
Article -
649
A European Mechanism for the Issuance and Initial Distribution of Debt Securities
Published 2020-06-01“…Abstract Although the European Union (EU) has implemented initiatives and common rules regarding securities settlements, no similar integration initiatives have been proposed for the issuance and initial distribution of debt securities. …”
Get full text
Article -
650
Big data architecture analysis and data security fusion technology
Published 2020-07-01Subjects: Get full text
Article -
651
A secure method of voting and planning based on quadratic voting
Published 2025-02-01“…This method combines the voting and planning, and gives the ability to voters to express their opinions about the candidates programs in addition to voting. Then, a secure electronic voting protocol is proposed for implementing our method. …”
Get full text
Article -
652
Ubiquitous Systems towards Green, Sustainable, and Secured Smart Environment
Published 2015-01-01Get full text
Article -
653
Physical layer security for the air-space-ground communication networks
Published 2018-03-01Subjects: Get full text
Article -
654
STATISTICAL ANALYSIS THE FOOD SECURITY OF THE RUSSIAN FEDERATION IN THE REGIONAL CONTEXT
Published 2017-02-01Subjects: “…food security…”
Get full text
Article -
655
Forward-secure ciphertext-policy attribute-based encryption scheme
Published 2014-07-01Subjects: “…forward-secure…”
Get full text
Article -
656
Mechanisms of Public Administration to Ensure Investment and Innovation Security of Territories
Published 2024-06-01“…The article analyzes the essence of the phenomenon of investment and innovation security, on the basis of which a qualitative assessment of the limits of the functionality of investment and innovation activities as components of economic security is formed. …”
Get full text
Article -
657
Methodology and software development for auditing information security management systems
Published 2022-12-01Subjects: Get full text
Article -
658
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
659
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01Subjects: Get full text
Article -
660
THE RISE OF ETHNIC MILITIA, BANDITRY AND IMPLICATION ON NATIONAL SECURITY IN NIGERIA
Published 2022-05-01Subjects: Get full text
Article