Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
161
Suggestions on cyber security talents cultivation
Published 2016-03-01Subjects: “…cyber security…”
Get full text
Article -
162
Data Security and Privacy in Cloud Computing
Published 2014-07-01“…Data security has consistently been a major issue in information technology. …”
Get full text
Article -
163
-
164
Food Security and Self-Sufficiency in Europe
Published 2017-12-01Subjects: “…food security…”
Get full text
Article -
165
Systems-thinking innovations for water security
Published 2025-01-01Subjects: Get full text
Article -
166
-
167
Research status and outlook of Android security
Published 2016-10-01Subjects: Get full text
Article -
168
Factorization of big integer and the security of RSA
Published 2017-05-01Subjects: Get full text
Article -
169
Making Simple Repairs: Home Security
Published 2019-05-01“… Keep your home safe and secure. When away from home, at night, or while sleeping lock your doors and windows. …”
Get full text
Article -
170
-
171
The Distribution of the Tax and Social Security Burden
Published 2021-04-01“…Abstract Using a cross-sectional analysis, this article investigates the burden of taxation and social security contributions across German households. The burden is determined with respect to household income as well as consumption level. …”
Get full text
Article -
172
Secure obfuscation for encrypted threshold signatures
Published 2020-06-01“…Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing the private key of threshold signature.Secondly,the security models of encrypted threshold signature functionality and the obfuscator were defined,such as the existential unforgeablity and the average case virtual black box property,and its correctness and security were proved.The analyses of theory and simulation experiment show that the obfuscation for encrypted threshold signature has feasibility.…”
Get full text
Article -
173
Covid-19 Implications to Transatlantic Security
Published 2024-04-01Subjects: Get full text
Article -
174
-
175
Research on evolution and security risk of Metaverse
Published 2022-04-01Subjects: Get full text
Article -
176
Research on cyberspace security situation awareness
Published 2016-10-01Subjects: “…cyber security…”
Get full text
Article -
177
-
178
Research on Security of Virtualization on Cloud Computing
Published 2015-06-01Subjects: Get full text
Article -
179
Fuzzy Estimation of the Character of the Securities Market
Published 2015-04-01“…To make the right decisions regarding the purchase or sale of financial assets the definition of the nature of the securities market is required. Existing methods of evaluation of the state securities market does not fully take into account the probability distribution of the states and fuzzy-multiple description of the character of securities market. …”
Get full text
Article -
180