Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
241
Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation
Published 2014-01-01“…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
Get full text
Article -
242
Translocality, Remittances, and Food Security in the Ghana-Qatar Migration Corridor
Published 2025-01-01“…The findings reveal that cash remittances play a crucial role in enhancing food security and the overall welfare of households in Ghana. …”
Get full text
Article -
243
A robust scheme for securing relational data incremental watermarking
Published 2025-06-01Subjects: Get full text
Article -
244
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
Published 2013-10-01Get full text
Article -
245
CYCLIC SYSTEM FOR TRAINING SPECIALISTS OF ECONOMIC SECURITY OF ENTERPRISES AND ORGANIZATIONS
Published 2020-09-01Subjects: Get full text
Article -
246
Characteristics of security risks of large industrial investments and their management principles
Published 2025-01-01Subjects: “…Industrial investment, risk assessment, asset security, data protection…”
Get full text
Article -
247
Implementasi Mekanisme End-To-End Security pada IoT Middleware
Published 2019-05-01“…The results show both mechanisms can securely communication between middleware and other parties, but AES-CBS can only secure data payload, not entire data. …”
Get full text
Article -
248
ISSUES OF ENSURING ECONOMIC AND ENERGY SECURITY IN THE “SMART CITY” SYSTEM
Published 2020-09-01Subjects: Get full text
Article -
249
Contribution of Russia to regional cooperation in the sphere of security in Central Asia
Published 2010-04-01Get full text
Article -
250
Smart contract-based secure cooperative spectrum sensing algorithm
Published 2021-12-01“…With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.…”
Get full text
Article -
251
QUALITATIVE CHANGES IN JAPAN’S POLICY IN THE FIELD OF MILITARY SECURITY IN 2013
Published 2013-10-01“…The article deals with the qualitative changes that have taken place in the course of Japan in the field of military security in December 2012 after the rise of the second Abe Cabinet. …”
Get full text
Article -
252
Indoor Vertical Farming Systems for Food Security and Resource Sustainability
Published 2020-04-01“…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
Get full text
Article -
253
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
Published 2016-05-01“…The scheme proved in this model can only be called selectively secure one. However, from a security perspective, the adaptively secure CP-ABPRE scheme is more desirable. …”
Get full text
Article -
254
FUTURE TRENDS OF FORMATION OF THE INTERNATIONAL REGIME ON THE PROVISION OF INFORMATION SECURITY
Published 2016-08-01Subjects: “…information security…”
Get full text
Article -
255
VALUATION OF DEBT SECURITIES FOR THE OBJECTIVES OF ACCOUNTING REPORTING IN THE RUSSIAN BANK
Published 2017-12-01Subjects: “…debt securities…”
Get full text
Article -
256
Monitoring the efficiency of organisation’s internal control and economic security system
Published 2022-03-01Subjects: Get full text
Article -
257
The Future of Water Resources Management, Water Security and Emerging Problems
Published 2024-01-01Subjects: Get full text
Article -
258
A bibliometric analysis of food security and urbanization: insights and implications
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
259
‘Bottom-up securitization’: A visual turn in security studies
Published 2024-03-01Subjects: “…international security…”
Get full text
Article -
260
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01“…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
Get full text
Article