-
1
Security model without managers for blockchain trading system
Published 2020-12-01Subjects: Get full text
Article -
2
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
3
Biomimetic security model based on immune system control mechanism
Published 2025-04-01Subjects: Get full text
Article -
4
Automated configuration,simulation and verification platform for event-driven home automation IoT system
Published 2019-09-01Subjects: “…internet of things;IFTTT framework;system security;model checking…”
Get full text
Article -
5
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: “…security model…”
Get full text
Article -
6
Wireless physical-layer security model based on perturbation theory and sensitivity analysis
Published 2013-06-01Subjects: “…security model;wireless communication;low probability of interception;sensitivity analysis…”
Get full text
Article -
7
CONCEPTUAL FRAMEWORK OF ANALYSIS OF INFORMATION SECURITY MODELS OF CLOUD SYSTEMS OF THE CLASS «INFRASTRUCTURE AS A SERVICE»
Published 2019-10-01Subjects: Get full text
Article -
8
A Novel Cryptography-Based Architecture for Secure Data Asset Sharing and Circulation Systems
Published 2025-06-01Subjects: Get full text
Article -
9
Data security challenges and countermeasures in financial technology
Published 2019-08-01Subjects: Get full text
Article -
10
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
Published 2014-07-01Subjects: Get full text
Article -
11
Permutation-Based Hash Chains with Application to Password Hashing
Published 2024-12-01Subjects: Get full text
Article -
12
Cryptanalysis of Ateniese–Steiner–Tsudik-Authenticated Group Key Management Protocol
Published 2024-09-01Subjects: Get full text
Article -
13
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: Get full text
Article -
14
Assessment of Landscape Risks and Ecological Security Patterns in the Tarim Basin, Xinjiang, China
Published 2025-06-01Subjects: “…ecological security model…”
Get full text
Article -
15
A Comprehensive Analysis of Security Challenges in ZigBee 3.0 Networks
Published 2025-07-01Subjects: Get full text
Article -
16
An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability
Published 2025-03-01Subjects: “…Enhanced Multi-Layer Blockchain Security Model…”
Get full text
Article -
17
A Comprehensive Integrated Security Model with Advanced Access Control for Enhancing WSN Computing in IoT Frameworks
Published 2025-01-01Subjects: Get full text
Article -
18
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…duality and multi-level security model…”
Get full text
Article -
19
Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media
Published 2014-04-01Subjects: Get full text
Article -
20
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…multi-level security;BLP model;Biba model;duality and multi-level security model;intransitive noninter-ference theory…”
Get full text
Article