Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
461
International Experience in Assessing Economic Security: Basic Approaches and Opportunities for Ukraine
Published 2020-06-01Subjects: Get full text
Article -
462
Military medicine and morale: Perceptions of inequities in triage impact national security
Published 2024-09-01Get full text
Article -
463
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Published 2014-01-01“…Proxy signcryption scheme provides a secure privilege delegation mechanism for a person to delegate his privilege to his proxy agent to accomplish things. …”
Get full text
Article -
464
A Secure RFID Authentication Protocol Adopting Error Correction Code
Published 2014-01-01“…RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. …”
Get full text
Article -
465
Identifying and Ranking Security Indicators in Online Social Networks with an MADM Technique
Published 2022-11-01Subjects: Get full text
Article -
466
A data pipeline for secure extraction and sharing of social determinants of health.
Published 2025-01-01“…<h4>Discussion and conclusion</h4>We describe a novel pipeline that can facilitate the secure acquisition and sharing of neighborhood-level SDOH without sharing PHI. …”
Get full text
Article -
467
THE NEXUS BETWEEN ARMED CONFLICT, SECURITY, PEACE EDUCATION AND DEVELOPMENT IN NIGERIA
Published 2023-09-01“… This paper examines the interconnection between armed conflict, security, education, peace, and development in Nigeria. …”
Get full text
Article -
468
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
469
Constructing RBAC Based Security Model in u-Healthcare Service Platform
Published 2015-01-01“…In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. …”
Get full text
Article -
470
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01“…The user authentication scheme in ubiquitous wireless sensor networks (WSNs) is an important security mechanism that allows users to access sensors through wireless networks. …”
Get full text
Article -
471
The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking
Published 2017-01-01“…With the development of human society and the development of Internet of things, wireless and mobile networking have been applied to every field of scientific research and social production. In this scenario, security and privacy have become the decisive factors. …”
Get full text
Article -
472
Information security of minors: individual subjects of the Russian Federation organization experience
Published 2023-02-01Subjects: “…information security…”
Get full text
Article -
473
MECHANISMS FOR ENSURING SUSTAINABLE DEVELOPMENT AND FOOD SECURITY OF A SOVEREIGN COUNTRY
Published 2020-05-01“…The problems of food security and tasks aimed at preventing internal and external threats, sustainable development of domestic production sufficient to ensure food independence and state sovereignty have been considered.…”
Get full text
Article -
474
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01“…Abstract Nowadays, the Internet of things (IoT) has extensively found its way into everyday life, raising the alarm regarding data security and user privacy. However, IoT devices have numerous limitations that inhibit the implementation of optimal cost‐effective security solutions. …”
Get full text
Article -
475
Cyber security and need to change the model of monitoring fraud and financial crime
Published 2020-01-01Subjects: Get full text
Article -
476
ORGANIZATIONAL - METHODICAL FEATURES OF EVELUATING THE EFFECTIVENESS OF SUSTEMS ECONOMIC SECURITY THE FIRM
Published 2016-03-01“…The study revealed the main methods of ensuring the economic security of the organization, their characteristics and differences from other management techniques. …”
Get full text
Article -
477
EVOLUTION OF CONFLICT STUDIES IN THE INTERNATIONAL SECURITY CONTEXT IN POST-SOVIET RUSSIA
Published 2016-10-01Subjects: Get full text
Article -
478
RETHINKING CLIMATE CHANGE AND NATIONAL SECURITY: IMPLICATIONS FOR SUSTAINABLE DEVELOPMENT IN NIGERIA
Published 2024-12-01Subjects: Get full text
Article -
479
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
Published 2016-05-01“…To improve such an issue, this paper proposes a secure but efficient scheme for resource constrained things. …”
Get full text
Article -
480
EFFECT OF PERCEIVED EASE OF USE AND SECURITY OF E-BANKING ON CUSTOMER SATISFACTION
Published 2022-12-01Subjects: Get full text
Article