Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
741
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
742
Security of differential phase shift QKD from relativistic principles
Published 2025-01-01“…We then show that security of DPS QKD can be reduced to security of the relativistic protocol. …”
Get full text
Article -
743
Cyber-security governance framework pillars for Zimbabwean local authorities
Published 2025-12-01Subjects: “…Cyber-security…”
Get full text
Article -
744
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01Subjects: Get full text
Article -
745
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01“…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
Get full text
Article -
746
THE LAUNDERING OF CRIMINAL CAPITAL AS A THREAT TO THE SECURITY OF RUSSIA'S ECONOMY
Published 2016-02-01“…Proven link between money laundering and the deterioration of Russia's economic security.…”
Get full text
Article -
747
Internet naming and addressing system security technology and application analysis
Published 2017-03-01Subjects: Get full text
Article -
748
Spectators’ perceptions regarding the security measures taken in soccer stadiums
Published 2023-03-01Subjects: Get full text
Article -
749
Safe and secure classification protocol in two-tiered sensor networks
Published 2015-02-01Subjects: Get full text
Article -
750
Identifying potential threats to economic security in a commercial organization
Published 2023-12-01Subjects: Get full text
Article -
751
Method of Secure Domain Creation for Multiple Points in Home Networking
Published 2015-11-01Subjects: Get full text
Article -
752
SECURITY EVALUATION ON THE STEEL STRUCTURE OF LIFT-SLIDING STEREO GARAGE
Published 2019-01-01Subjects: Get full text
Article -
753
Agriculture Based Food Producing Countries Are Less Secured in Food
Published 2025-02-01Subjects: “…food security…”
Get full text
Article -
754
Electric internet of things security framework and technologies for energy interconnection
Published 2021-02-01Subjects: Get full text
Article -
755
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Published 2022-03-01Subjects: Get full text
Article -
756
Ways of improving the economic security of fuel and energy complex enterprises
Published 2023-02-01Subjects: “…economic security…”
Get full text
Article -
757
Conflict and State Security in the Horn of Africa: Militarization of Civilian Groups
Published 2022-01-01Get full text
Article -
758
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: “…security protocols…”
Get full text
Article -
759
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…These numerous accounts have to be managed in a secure and simple way to be protected against identity theft. …”
Get full text
Article -
760
URBANIZATION, MIGRATION, AND HUMAN SECURITY: IMPLICATIONS FOR SUSTAINABLE DEVELOPMENT IN AFRICA
Published 2023-09-01Subjects: Get full text
Article