Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
681
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01Get full text
Article -
682
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01“…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
Get full text
Article -
683
Exploring the dynamics of energy security and energy poverty in the Andean basin
Published 2025-12-01Subjects: “…Energy security…”
Get full text
Article -
684
LEGAL MIGRATION – RIGHTS AND BENEFITS IN THE EUROPEAN SOCIAL SECURITY SYSTEM
Published 2024-12-01Subjects: Get full text
Article -
685
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01“…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
Get full text
Article -
686
The War in Ukraine, Agricultural Trade and Risks to Global Food Security
Published 2022-06-01“…Abstract Any calls to move towards a centrally planned economy or autarky are strongly advised against, as this would only be to the detriment of food security in the Global South.…”
Get full text
Article -
687
Changing role of security alliances in the post-Cold War era
Published 2024-07-01“…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
Get full text
Article -
688
Communication and Security Integrated Space-Earth Heterogeneous Network Architecture
Published 2020-12-01Subjects: Get full text
Article -
689
Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications
Published 2024-01-01“…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
Get full text
Article -
690
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Subjects: “…border gateway protocol security…”
Get full text
Article -
691
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
692
Evolution of Biotechnology and Information Technology and Its Impact on Human Security
Published 2015-10-01Subjects: Get full text
Article -
693
Analysis on the progress of quantum secure communication test evaluation and standardization
Published 2018-09-01Subjects: Get full text
Article -
694
Treasury Pattern Analysis and Application Based on Security Control Platform
Published 2013-06-01Get full text
Article -
695
Survey on the visualization technologies of threatening security data in cyber space
Published 2018-02-01Subjects: “…cyber space security…”
Get full text
Article -
696
Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA
Published 2013-01-01Get full text
Article -
697
A Clonal Selection Optimization System for Multiparty Secure Computing
Published 2021-01-01“…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
Get full text
Article -
698
MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY
Published 2016-03-01“…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
Get full text
Article -
699
An Assessment of the Current Status and Future Direction of the Field of Security Studies
Published 2024-12-01Subjects: “…security studies…”
Get full text
Article -
700
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
Get full text
Article