Suggested Topics within your search.
Suggested Topics within your search.
- COMPUTERS / Security / General 1
- Civil rights 1
- Crime prevention 1
- Information technology 1
- Internal security 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Prevention 1
- Security, International 1
- Technology 1
- Violence 1
-
1
INFORMATION SAFETY AS A FACTOR OF NATIONAL SAFETY AND COMPETITIVE ABILITY OF THE STATE
Published 2022-08-01Get full text
Article -
2
-
3
A Giant with Feet of Clay? The EU’s Ability to Develop Capabilities for Civilian Crisis Management
Published 2012-12-01Get full text
Article -
4
Perceived ability to comply with national COVID-19 mitigation strategies and their impact on household finances, food security, and mental well-being of medical and pharmacy students in Liberia.
Published 2021-01-01“…Logistic regression was used to model factors associated with ability to comply with COVID-19 mitigation strategies, as well as participant's food security.…”
Get full text
Article -
5
Human security in the context of unconventional security threats. A theoretical approach
Published 2025-04-01“… This article explores the concept of human security in the context of the emergence of a suite of unconventional threats that undermine traditional state-centered security paradigms. …”
Get full text
Article -
6
Quantum secured blockchain framework for enhancing post quantum data security
Published 2025-08-01“…QKD: The system supports tamper-proof key exchange, quantum-resilient consensus among validator nodes, and secure transaction signing. Experimental evaluation demonstrates that QuantumShield-BC achieves low consensus latency and high throughput, while providing perfect security against simulated attacks from Shor’s and Grover’s algorithms. …”
Get full text
Article -
7
Decentralizing security architecture: evaluating federalism’s role in enhancing security frameworks in Nigeria
Published 2024-06-01“…The existing centralized security architecture has been found wanting in its ability to effectively mitigates these threats and safeguards the well-being of Nigerian citizens. …”
Get full text
Article -
8
Study on the Heterogeneity of Social Security Affecting the Sense of Security of Urban and Rural Residents
Published 2022-01-01“…Change the concept of government management, build a communication platform between the government and the people, and improve residents’ subjective sense of security. We should continue to expand the coverage of the system, promote the coverage of basic social security projects, and improve the ability of urban and rural residents to cope with risks.…”
Get full text
Article -
9
-
10
Extension of the basic Global Health Security (GHS) index: Health system security indicator
Published 2021-01-01“…This extension of the GHS index provides a more reliable model for predicting the ability of a country's health system to provide an adequate response in a pandemic crisis when human health is seriously endangered. …”
Get full text
Article -
11
Innovation and development of big data ability open platform
Published 2017-01-01“…China Unicom has built a cooperation platform called big data ability open platform based on its own advantages in order to establish a win-win cooperative,coexistent,and sustainable eco-system.The open platform provides variety services in the form of multi-tenancy model for branch companies and partners in aspects of ability access,resource isolation,operation,security,and data services.The open platform satisfies the requirements of internal and external storage capacity and computing ability,data services,and platform tools,thus brings enormous benefits to China Unicom Headquarters.…”
Get full text
Article -
12
FOOD SECURITY: ESSENCE OF THE NOTION
Published 2017-09-01“…The author discloses the essence of such notions as 'security', 'national security', 'food security'. The author provides interpretation of the term 'food security' as ability of the country irrespective of international situation to provide all layers of the population with an access to safe, high- quality food in the amount necessary for active and healthy life without cutting state food reserves.…”
Get full text
Article -
13
FOOD SECURITY: TOPICALITY FOR RUSSIA
Published 2018-06-01“…It is stipulated mainly by the fact that food security standing shows the ability of the agro-industrial complex to provide the population with foods and at the same time to support the balanced and optimal correlation between home production and imported food. …”
Get full text
Article -
14
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01“…The previous work in “Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT” proposed a novel AKA scheme for secure IoT environments. …”
Get full text
Article -
15
Evaluation of the IT-security level of network videosurveillance
Published 2019-06-01Get full text
Article -
16
Provable secure digital watermarking scheme
Published 2008-01-01“…A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency.…”
Get full text
Article -
17
Provable secure digital watermarking scheme
Published 2008-01-01“…A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency.…”
Get full text
Article -
18
Operationalisation of the European Union security policy
Published 2006-01-01“…From the creation and adoption of the European Security Strategy, the European Union has made several specific steps in the development of the European Security and Defense Policy. …”
Get full text
Article -
19
Construction of Intensive Security Domain Protection System for Service Platform——Discussion of Security Domain Division and Boundary Integration
Published 2013-08-01“…With the continuous expansion of network scale and the development of service platform,how to improve the safety protection ability of service platform has become the focus of communication network operation and maintenance for telecom operators,in order to achieve the effective and intensive protection of service platforms,the most effective way is security domain division and boundary integration.Reference to the maintenance of China Telecom service platforms and the experience of the industry,the method of security domain division and the boundary integration was analyzed,and the construction of a intensive security domain division system for service platform was discussed.…”
Get full text
Article -
20
Enhancing Security and Privacy in 5G Device-to-Device Communication: A Secure Gale-Shapley Algorithm Approach
Published 2025-01-01“…We validated the framework through extensive MATLAB simulations, demonstrating its ability to achieve high throughput and low latency, even in the presence of various security threats. …”
Get full text
Article