Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
641
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
Get full text
Article -
642
Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
Published 2020-03-01“…In order to ensure data security for deduplication, different data should be assigned with different privacy levels. …”
Get full text
Article -
643
Legal Certainty Regarding the Conversion of Land Certificates To An Electronic System Based On Security Principles
Published 2024-11-01Subjects: “…security guarantee,…”
Get full text
Article -
644
Concepts and types of administrative and legal means of ensuring economic security by the National Police of Ukraine
Published 2018-12-01“…The conducted research should become the basis for studying the problems of certain administrative and legal means of ensuring economic security by the National Police of Ukraine, which is a perspective direction for further scientific research.…”
Get full text
Article -
645
DIGITAL SECURITY IN EDUCATIONAL TRAINING PROGRAMS: A STUDY BASED ON FUTURE TEACHERS’ PERCEPTIONS
Published 2023-06-01Subjects: Get full text
Article -
646
Social leadership and authority in the field of national and military security: problems of formation in the digital world
Published 2021-04-01Subjects: Get full text
Article -
647
Wireless body area network: Architecture and security mechanism for healthcare using internet of things
Published 2025-01-01“…The data generated by small sensor devices need strong security methods for secure transmission over a public network. …”
Get full text
Article -
648
Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks
Published 2015-01-01“…In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. …”
Get full text
Article -
649
A plithogenic statistical approach to digital security measures and emotional health in childhood and adolescence
Published 2024-11-01Subjects: Get full text
Article -
650
UN SECRETARY-GENERAL NORMATIVE CAPABILITY TO INFLUENCE THE SECURITY COUNCIL DECISION-MAKING PROCESS
Published 2016-12-01Subjects: Get full text
Article -
651
-
652
A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks
Published 2015-01-01“…So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. …”
Get full text
Article -
653
Solvable constraints and unsolvable limits to global climate adaptation in coastal Indigenous food security
Published 2025-01-01Subjects: Get full text
Article -
654
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
655
Strong incidence domination in some operations of fuzzy incidence graphs and application in security allocation
Published 2024-12-01“…Additionally, the paper discusses an application of SID in security allocation.…”
Get full text
Article -
656
-
657
A social security bonus for a new start out of the mini-job crisis
Published 2021-10-01Get full text
Article -
658
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
Published 2011-01-01“…BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.…”
Get full text
Article -
659
Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction
Published 2023-01-01“…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
Get full text
Article -
660
Retracted: Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm
Published 2023-01-01Get full text
Article