Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
841
HERDSMEN AND FARMERS CLASHES IN NORTH CENTRAL NIGERIA: NATIONAL SECURITY IMPLICATIONS
Published 2024-07-01“…This paper examines the national security implications of herdsmen and farmers conflict on Nigerian national security. …”
Get full text
Article -
842
To the problem of optimization of criteria for evaluating the effectiveness of providing the national security of the State
Published 2022-03-01Subjects: Get full text
Article -
843
Secure RSSI-based node positioning mechanism for wireless sensor networks
Published 2012-07-01Subjects: Get full text
Article -
844
Research on national security risk assessment model of open government data
Published 2020-12-01“…As an important strategic resource of national and social development,the government open data is of great value.But China lack standards in the security risk assessment of government open data,especially the security of national data is at risk.Based on the theory of information security risk assessment,a government open data security risk assessment model was constructed with national security assets,open data vulnerability and security threat as the main security risk elements.Analytic hierarchy process (AHP) and fuzzy comprehensive evaluation methods were used to quantify and evaluate the security risks of government open data,and the validity of the model is verified by example.…”
Get full text
Article -
845
RETHINKING CLIMATE CHANGE AND NATIONAL SECURITY: IMPLICATIONS FOR SUSTAINABLE DEVELOPMENT IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
846
Eavesdropping against wireless spatial scrambling secure communication: hyperplane clustering
Published 2014-04-01Subjects: “…physical-layer security…”
Get full text
Article -
847
Secure OFDM transmission scheme based on two-stage chaos mapping
Published 2016-07-01Subjects: “…secure communication…”
Get full text
Article -
848
A reference measurement framework of software security product quality (SPQNFSR)
Published 2021-01-01Subjects: Get full text
Article -
849
HUMAN RIGHTS AND NATIONAL SECURITY: FRANCE IN SEARCH OF THE RESOLUTION OF THE MIGRATION CRISIS
Published 2018-07-01Subjects: Get full text
Article -
850
Discovering The Significant Potential of Edible Insects In Food, Feed, And Drug Security
Published 2024-11-01Get full text
Article -
851
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: Get full text
Article -
852
BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks
Published 2013-03-01“…Localization is the key supporting technology for wireless sensor networks (WSNs). Security and accuracy are the premise of the localization application. …”
Get full text
Article -
853
The importance of SC UN Resolution 1325 for improving the state of human security
Published 2024-01-01Subjects: Get full text
Article -
854
TRENDS IN GLOBAL TRANSFORMATIONS OF COUNTRIES IN THE CONTEXT OF THEIR DEVELOPMENT AND ENSURING NATIONAL SECURITY
Published 2025-01-01Subjects: “…national and international security…”
Get full text
Article -
855
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01“…As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.…”
Get full text
Article -
856
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01Subjects: Get full text
Article -
857
Secure Pesticide Storage: Essential Structural Features of a Storage Building
Published 2004-10-01Get full text
Article -
858
Cyber Security Intrusion Detection Using a Deep Learning Method
Published 2025-01-01“…The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. …”
Get full text
Article -
859
Modern trends and conceptual approaches to understanding the essence of the concept of “national security”
Published 2022-12-01Subjects: “…national security…”
Get full text
Article -
860
African Crisis Response Initiative and the New African Security (Dis)order
Published 2022-01-01Get full text
Article