Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
701
Attribute generalization mix-zone based on multiple secure computation
Published 2019-04-01Subjects: Get full text
Article -
702
PHILOSOPHY OF WAR AND PEACE: IN SEARCH OF NEW EUROPEAN SECURITY STRATEGY
Published 2017-12-01Subjects: “…european security strategy…”
Get full text
Article -
703
Modeling and security analysis of hardware trojan attack based on GSCPN
Published 2024-08-01“…Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack and security assessment model based on the generalized stochastic coloring Petri net (GSCPN) was proposed. …”
Get full text
Article -
704
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
705
A survey of V2X security protection technologies
Published 2023-03-01Subjects: “…V2X security…”
Get full text
Article -
706
SDN security control and forwarding method based on cipher identification
Published 2018-02-01Subjects: Get full text
Article -
707
Partially blind proxy re-signature scheme with proven security
Published 2018-02-01“…In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially blind proxy re-signature was also given.Based on the improved Shao scheme,a partially blind proxy re-signature scheme in the standard model was proposed.The proposed scheme allows proxy to add some public information negotiated by delegatee and proxy to re-signature.The scheme not only can achieve the transparent signature conversion from delegatee to proxy and protect privacy of message re-signed by proxy,but also prevented illegal use of re-signature.Analysis results show that the proposed scheme is correct,multi-use,partially blind and existentially unforgeable.It is more suitable for e-government data exchange system,cross-domain authentication system and so on.…”
Get full text
Article -
708
Flow consistency in an intensive SDN security architecture with multiple controllers
Published 2017-12-01Subjects: Get full text
Article -
709
External Security and Refugee Protection as Pan-European Public Goods
Published 2022-05-01Get full text
Article -
710
Research on metrics models for cloud services information security evaluation
Published 2016-07-01Subjects: Get full text
Article -
711
Survey on rail transit mobile edge computing network security
Published 2023-04-01“…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
Get full text
Article -
712
Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency
Published 2025-01-01“…In particular, we demonstrate how blockchain can improve critical aspects of the security and transparency of digital twins by analyzing a real-world scenario and evaluating produced experimental data. …”
Get full text
Article -
713
Assessment of Economic Management of Land Resources to Enhance Food Security
Published 2025-01-01“… To achieve the goals of balanced development of the agricultural sector to ensure food security, there is a need to improve management processes in the sphere of agricultural land use. …”
Get full text
Article -
714
The Role of Security Perception and Usage Impact of Mobile Accounting Applications
Published 2025-01-01Subjects: “…technology acceptance model; mobile accounting application; security perception.…”
Get full text
Article -
715
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01Subjects: Get full text
Article -
716
Security Study of Software-Defined Enterprise Data Center Network
Published 2014-11-01Subjects: Get full text
Article -
717
Physical layer security of relay selection NOMA wireless systems
Published 2024-03-01Subjects: Get full text
Article -
718
Secure and collaborative spectrum sensing scheme based on audit game
Published 2023-12-01Subjects: Get full text
Article -
719
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
Get full text
Article -
720
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Subjects: Get full text
Article