Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
321
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
Get full text
Article -
322
Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor
Published 2019-12-01Subjects: “…euro-atlantic security system…”
Get full text
Article -
323
Military and political security in the Arctic before and amidst the Ukrainian crisis
Published 2024-11-01Subjects: Get full text
Article -
324
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01Get full text
Article -
325
Exploring the dynamics of energy security and energy poverty in the Andean basin
Published 2025-12-01Subjects: “…Energy security…”
Get full text
Article -
326
LEGAL MIGRATION – RIGHTS AND BENEFITS IN THE EUROPEAN SOCIAL SECURITY SYSTEM
Published 2024-12-01Subjects: Get full text
Article -
327
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01“…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
Get full text
Article -
328
Changing role of security alliances in the post-Cold War era
Published 2024-07-01“…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
Get full text
Article -
329
Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications
Published 2024-01-01“…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
Get full text
Article -
330
Evolution of Biotechnology and Information Technology and Its Impact on Human Security
Published 2015-10-01Subjects: Get full text
Article -
331
Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA
Published 2013-01-01Get full text
Article -
332
A Clonal Selection Optimization System for Multiparty Secure Computing
Published 2021-01-01“…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
Get full text
Article -
333
MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY
Published 2016-03-01“…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
Get full text
Article -
334
PHILOSOPHY OF WAR AND PEACE: IN SEARCH OF NEW EUROPEAN SECURITY STRATEGY
Published 2017-12-01Subjects: “…european security strategy…”
Get full text
Article -
335
External Security and Refugee Protection as Pan-European Public Goods
Published 2022-05-01Get full text
Article -
336
Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency
Published 2025-01-01“…In particular, we demonstrate how blockchain can improve critical aspects of the security and transparency of digital twins by analyzing a real-world scenario and evaluating produced experimental data. …”
Get full text
Article -
337
Assessment of Economic Management of Land Resources to Enhance Food Security
Published 2025-01-01“… To achieve the goals of balanced development of the agricultural sector to ensure food security, there is a need to improve management processes in the sphere of agricultural land use. …”
Get full text
Article -
338
The Role of Security Perception and Usage Impact of Mobile Accounting Applications
Published 2025-01-01Subjects: “…technology acceptance model; mobile accounting application; security perception.…”
Get full text
Article -
339
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
Get full text
Article -
340
LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation
Published 2021-01-01“…Yashar et al. recently proposed a secure key exchange scheme for the fog federation. …”
Get full text
Article