Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
661
Analysis of Terminal Security Issue and Solution in Mobile Internet Era
Published 2014-12-01Subjects: Get full text
Article -
662
Provably secure partially blind signature without trusted PKG
Published 2010-01-01“…The proposed scheme satisfies security properties: correctness and partial blindness. …”
Get full text
Article -
663
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01“…In this paper, we argue that the long-hold design principles of data link layer protocols are unreasonable from the perspective of wireless security. A secure ARQ scheme for wireless sensor networks named Sec-ARQ is proposed. …”
Get full text
Article -
664
The Security Needs of International Students: An Analysis in Terms of the Securitization Theory
Published 2023-06-01“…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
Get full text
Article -
665
Research on construction technology of artificial intelligence security knowledge graph
Published 2023-04-01Subjects: “…artificial intelligence security…”
Get full text
Article -
666
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
667
New secure distributed secret sharing scheme of n product
Published 2014-11-01Subjects: Get full text
Article -
668
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks
Published 2013-06-01“…To solve the problems of limited energy of the nodes and security of routing in wireless sensor networks, load-balanced secure routing protocol (LSRP), a load-balanced secure routing protocol for wireless sensor networks, is proposed. …”
Get full text
Article -
669
The National Police of Ukraine activities in the sphere of ensuring national security
Published 2023-07-01Subjects: Get full text
Article -
670
IMPACT ASSESSMENT OF NIGERIA POLICE FORCE ON THE SECURITY MAINTANANCE IN NIGERIA
Published 2024-06-01Subjects: “…Security…”
Get full text
Article -
671
A survey of attack and defense on human-computer interaction security
Published 2019-10-01“…With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer interaction security attacks frequently occur.The status of four kinds of human-computer interaction technologies:HID-USB,fingerprint recognition,speech recognition and face recognition,as well as the offensive and defensive benefits were reviewed and analyzed,and the research direction of human-computer interaction security in the future was discussed.At the same time,some suggestions were given.…”
Get full text
Article -
672
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Subjects: Get full text
Article -
673
A New Data Coding Algorithm for Secure Communication of Image
Published 2024-11-01“…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
Get full text
Article -
674
Formal Security in the Works of Legal Scholars of Pre-Soviet Period
Published 2021-07-01Subjects: “…formal security…”
Get full text
Article -
675
Research on security multi-party computing based on game theory
Published 2018-01-01Subjects: Get full text
Article -
676
Management technologies of cyberspace endogenous safety and security test site
Published 2021-03-01Subjects: “…endogenous safety and security…”
Get full text
Article -
677
Game model based security strategy of heterogeneous controllers in the cloud
Published 2018-09-01Subjects: Get full text
Article -
678
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
Get full text
Article -
679
Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor
Published 2019-12-01Subjects: “…euro-atlantic security system…”
Get full text
Article -
680
Military and political security in the Arctic before and amidst the Ukrainian crisis
Published 2024-11-01Subjects: Get full text
Article