Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
741
-
742
Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks
Published 2016-07-01“…To overcome these drawbacks, we propose a secure biometric-based authentication scheme in WSNs that is secure against inside adversaries and provides secure and efficient smart card revocation/reissue.…”
Get full text
Article -
743
E-LEARNING AS AN INSTRUMENT ENSURING NATIONAL COMPETITIVE ADVANTAGES DEVELOPMENT AND THE SOURCE OF NATIONAL SECURITY THREATS
Published 2016-12-01Subjects: Get full text
Article -
744
Synthesizing the impact of armed conflicts on food security, livelihoods and social dynamics in Amhara region, Ethiopia
Published 2025-02-01“…This resulted in severe damage to the food security, livelihoods and social dynamics of communities in the Amhara region. …”
Get full text
Article -
745
A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks
Published 2014-01-01“…The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. …”
Get full text
Article -
746
MalAware: A tabletop exercise for malware security awareness education and incident response training
Published 2024-01-01Subjects: Get full text
Article -
747
-
748
The evolution of food security in Japan-Based on an indicator evaluation system including climate change indicators.
Published 2025-01-01“…As climate change intensifies, food security has received widespread attention. This study examines the development of Japan's food security index and its relationship with climate change. …”
Get full text
Article -
749
Peculiarities of legal regulation of activities of the National Police of Ukraine in the field of ensuring information security in Ukraine
Published 2020-12-01Subjects: “…information security…”
Get full text
Article -
750
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…Thus, the proposed scheme is more desirable for securing communication in mobile networks.…”
Get full text
Article -
751
RNA Biopesticides: A Cutting‐Edge Approach to Combatting Aquaculture Diseases and Ensuring Food Security
Published 2024-12-01“…With high specificity and minimal environmental impact, RNA biopesticides provide an innovative, sustainable approach to combating diseases in aquaculture, enhancing both food security and environmental safety.…”
Get full text
Article -
752
-
753
Impacts of Climate Change on Water Resources, Agricultural Production and Food Security: Evidence from Turkiye
Published 2023-01-01Subjects: Get full text
Article -
754
On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys
Published 2014-01-01“…Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. …”
Get full text
Article -
755
The Role of Great Britain in Forming of EU’s Foreign and Security Policy in the Context of Leading Theories of Eurointegration
Published 2015-02-01Subjects: Get full text
Article -
756
Food security and dietary intake of a cohort of South African students during COVID-19
Published 2025-01-01Subjects: Get full text
Article -
757
Security and religion in democratizing Tunisia: re-enacting surveillance through religious narratives and gendered dynamics
Published 2024-07-01Subjects: Get full text
Article -
758
A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents
Published 2013-01-01“…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
Get full text
Article -
759
A security detection approach based on autonomy-oriented user sensor in social recommendation network
Published 2022-03-01“…However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. …”
Get full text
Article -
760
Assessing Structural Components of Investment and Innovation Provision of Economic Security in the Basic Types of Economic Activity
Published 2021-06-01“…The article shows the progressive and practical value of a structural approach to the evaluation of investment and innovation provision of economic security, including the basic types of economic activity. …”
Get full text
Article