Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
101
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01“…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
Get full text
Article -
102
-
103
Research on the Solution of Business Platform Security
Published 2013-08-01Subjects: “…business platform security…”
Get full text
Article -
104
-
105
-
106
Emerging international regime of information security
Published 2021-11-01Subjects: “…international information security…”
Get full text
Article -
107
Survey on network security based on blockchain
Published 2018-03-01Subjects: “…network security…”
Get full text
Article -
108
The status of the Prime Minister in the sphere of security
Published 2024-12-01Subjects: “…security…”
Get full text
Article -
109
-
110
Development of the Japanese Environmental Security Concept
Published 2015-06-01Subjects: Get full text
Article -
111
-
112
Virtualization security:the good,the bad and the ugly
Published 2016-10-01Subjects: “…virtualization security…”
Get full text
Article -
113
Right of Access to Information and Media Security
Published 2019-10-01“…With the development of virtual law institutions, the priority of media security is to preserve the superiority of creative works created by man over the results of computer processing of information. …”
Get full text
Article -
114
Wireless secure enhancement with cooperative jamming
Published 2017-02-01“…Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.…”
Get full text
Article -
115
Secure Pesticide Storage: General Features
Published 2009-12-01“…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
116
-
117
Secure Pesticide Storage: General Features
Published 2009-12-01“…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
Get full text
Article -
118
Problem Solving and Personality in Security Officers
Published 2021-12-01Subjects: Get full text
Article -
119
Discussion on the cultivation of cyber security talents
Published 2019-06-01Subjects: “…cyber security…”
Get full text
Article -
120
Globalization, Security and Governance Challenges in Nigeria
Published 2024-09-01Subjects: Get full text
Article