-
121
Ritual as mechanism for securing life and averting evil among the Krobo
Published 2008-06-01Get full text
Article -
122
Synchronization of hyperchaos of cellular neural network with applications to secure communication
Published 2000-01-01Get full text
Article -
123
Security against differential and linear cryptanalysis for general SPT models
Published 2012-01-01Get full text
Article -
124
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01Get full text
Article -
125
Performance analysis of physical layer security based on channel correlation
Published 2021-03-01Get full text
Article -
126
Secure transmission for NOMA downlink based on short packet communication
Published 2021-02-01Get full text
Article -
127
Climate change and agricultural productivity: Economic implications for food security
Published 2024-12-01Get full text
Article -
128
Security Challenges: Appraisal of Threats to Nigeria’s Sovereignty in the Fourth Republic (1999-2019)
Published 2023-07-01Get full text
Article -
129
IMPACT OF ELECTRONIC RECORDS MANAGEMENT SYSTEM ON THE SECURITY OF RECORDS AMONG ADMINISTRATIVE STAFF
Published 2023-12-01Get full text
Article -
130
TECHNICAL EDUCATION AS A PANACEA FOR CURBING BANDITRY AND SECURITY CHALLENGES IN NORTHWEST NIGERIA
Published 2025-01-01Get full text
Article -
131
-
132
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Get full text
Article -
133
Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms
Published 2025-01-01Get full text
Article -
134
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Get full text
Article -
135
Promoting Agricultural Research and Development to Strengthen Food Security in South Asia
Published 2014-01-01Get full text
Article -
136
Theories and Practices of Societal Security in the Scandinavian Countries: A Comparative Analysis
Published 2024-12-01Get full text
Article -
137
Design and Implementation of an Ethical AI-Based Teaching Assistant for IoT Security Education
Published 2024-12-01Get full text
Article -
138
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01Get full text
Article -
139
Energy Efficiency Maximization with Optimal Beamforming in Secure MISO CRNs with SWIPT
Published 2021-01-01Get full text
Article -
140
Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection
Published 2017-01-01Get full text
Article