Showing 321 - 340 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 321

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
    Get full text
    Article
  2. 322

    Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor by M. M. Panyuzheva

    Published 2019-12-01
    Subjects: “…euro-atlantic security system…”
    Get full text
    Article
  3. 323
  4. 324
  5. 325
  6. 326
  7. 327

    A Secure and Efficient White-Box Implementation of SM4 by Xiaobo Hu, Yanyan Yu, Yinzi Tu, Jing Wang, Shi Chen, Yuqi Bao, Tengyuan Zhang, Yaowen Xing, Shihui Zheng

    Published 2024-12-01
    “…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
    Get full text
    Article
  8. 328

    Changing role of security alliances in the post-Cold War era by I. A. Istomin, A. V. Levchenko

    Published 2024-07-01
    “…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
    Get full text
    Article
  9. 329

    Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications by Y. P. Makimaa, R. Sudarmani

    Published 2024-01-01
    “…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
    Get full text
    Article
  10. 330
  11. 331
  12. 332

    A Clonal Selection Optimization System for Multiparty Secure Computing by Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu, Xiang Wu

    Published 2021-01-01
    “…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
    Get full text
    Article
  13. 333

    MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY by N. Unizhayev

    Published 2016-03-01
    “…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
    Get full text
    Article
  14. 334

    PHILOSOPHY OF WAR AND PEACE: IN SEARCH OF NEW EUROPEAN SECURITY STRATEGY by O. O. Bazaluk, D. B. Svyrydenko

    Published 2017-12-01
    Subjects: “…european security strategy…”
    Get full text
    Article
  15. 335
  16. 336

    Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency by Alessio Ferone, Stefano Verrilli

    Published 2025-01-01
    “…In particular, we demonstrate how blockchain can improve critical aspects of the security and transparency of digital twins by analyzing a real-world scenario and evaluating produced experimental data. …”
    Get full text
    Article
  17. 337

    Assessment of Economic Management of Land Resources to Enhance Food Security by Dinara Tleshpayeva, Natalia Bondarenko, Mikhail Leontev, Galina Mashentseva, Julia Plaksa, Andrey Zharov, Diana Stepanova, Agzhan Karbozova

    Published 2025-01-01
    “… To achieve the goals of balanced development of the agricultural sector to ensure food security, there is a need to improve management processes in the sphere of agricultural land use. …”
    Get full text
    Article
  18. 338

    The Role of Security Perception and Usage Impact of Mobile Accounting Applications by Isna Ardila, Masta Sembiring, Rini Astuti

    Published 2025-01-01
    Subjects: “…technology acceptance model; mobile accounting application; security perception.…”
    Get full text
    Article
  19. 339

    Optimal Management of Computer Network Security in the Era of Big Data by Minfeng Chen

    Published 2022-01-01
    “…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
    Get full text
    Article
  20. 340

    LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation by Yashar Salami, Vahid Khajehvand

    Published 2021-01-01
    “…Yashar et al. recently proposed a secure key exchange scheme for the fog federation. …”
    Get full text
    Article