Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
701
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
702
Evolution of Biotechnology and Information Technology and Its Impact on Human Security
Published 2015-10-01Subjects: Get full text
Article -
703
Analysis on the progress of quantum secure communication test evaluation and standardization
Published 2018-09-01Subjects: Get full text
Article -
704
Treasury Pattern Analysis and Application Based on Security Control Platform
Published 2013-06-01Get full text
Article -
705
Survey on the visualization technologies of threatening security data in cyber space
Published 2018-02-01Subjects: “…cyber space security…”
Get full text
Article -
706
Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA
Published 2013-01-01Get full text
Article -
707
A Clonal Selection Optimization System for Multiparty Secure Computing
Published 2021-01-01“…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
Get full text
Article -
708
MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY
Published 2016-03-01“…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
Get full text
Article -
709
An Assessment of the Current Status and Future Direction of the Field of Security Studies
Published 2024-12-01Subjects: “…security studies…”
Get full text
Article -
710
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
Get full text
Article -
711
Attribute generalization mix-zone based on multiple secure computation
Published 2019-04-01Subjects: Get full text
Article -
712
PHILOSOPHY OF WAR AND PEACE: IN SEARCH OF NEW EUROPEAN SECURITY STRATEGY
Published 2017-12-01Subjects: “…european security strategy…”
Get full text
Article -
713
Modeling and security analysis of hardware trojan attack based on GSCPN
Published 2024-08-01“…Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack and security assessment model based on the generalized stochastic coloring Petri net (GSCPN) was proposed. …”
Get full text
Article -
714
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
715
A survey of V2X security protection technologies
Published 2023-03-01Subjects: “…V2X security…”
Get full text
Article -
716
SDN security control and forwarding method based on cipher identification
Published 2018-02-01Subjects: Get full text
Article -
717
Partially blind proxy re-signature scheme with proven security
Published 2018-02-01“…In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially blind proxy re-signature was also given.Based on the improved Shao scheme,a partially blind proxy re-signature scheme in the standard model was proposed.The proposed scheme allows proxy to add some public information negotiated by delegatee and proxy to re-signature.The scheme not only can achieve the transparent signature conversion from delegatee to proxy and protect privacy of message re-signed by proxy,but also prevented illegal use of re-signature.Analysis results show that the proposed scheme is correct,multi-use,partially blind and existentially unforgeable.It is more suitable for e-government data exchange system,cross-domain authentication system and so on.…”
Get full text
Article -
718
Flow consistency in an intensive SDN security architecture with multiple controllers
Published 2017-12-01Subjects: Get full text
Article -
719
External Security and Refugee Protection as Pan-European Public Goods
Published 2022-05-01Get full text
Article -
720
Research on metrics models for cloud services information security evaluation
Published 2016-07-01Subjects: Get full text
Article