Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
961
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
962
Energy Efficiency Maximization with Optimal Beamforming in Secure MISO CRNs with SWIPT
Published 2021-01-01Get full text
Article -
963
Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection
Published 2017-01-01“…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
Get full text
Article -
964
Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results
Published 2011-01-01“…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
Get full text
Article -
965
Research category and future development trend of data elements circulation and security
Published 2024-05-01Subjects: Get full text
Article -
966
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01Subjects: Get full text
Article -
967
New adaptively secure key-policy attribute-based encryption scheme
Published 2012-09-01Subjects: Get full text
Article -
968
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article -
969
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: “…universally composable security…”
Get full text
Article -
970
Security environment of the state in the context of the Ministry of Internal Affairs of Ukraine activities
Published 2023-06-01Subjects: “…security…”
Get full text
Article -
971
New construction of secure range query on encrypted data in cloud computing
Published 2015-02-01“…To solve the information leakage problem resulting from several assertions of previous range query solutions,there is a secure range query scheme with one assertion (SRQSAE scheme),and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented,and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword,and it achieves high level needs of security without losing efficiency.…”
Get full text
Article -
972
Robust resource allocation algorithm for multicarrier NOMA security communication system
Published 2022-03-01Subjects: Get full text
Article -
973
Enhancing food and nutrition security in Himalayan foothills with neglected and underutilized millets
Published 2025-01-01Subjects: “…Food security…”
Get full text
Article -
974
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01“…In this way managing additional secret key includes an additional layer of security.…”
Get full text
Article -
975
Police crime in 1947 in the coverage of the Ukrainian SSR state security agencies
Published 2022-12-01Subjects: Get full text
Article -
976
An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment
Published 2016-01-01“…Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. …”
Get full text
Article -
977
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
978
A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
Published 2014-01-01“…Software security defects have a serious impact on the software quality and reliability. …”
Get full text
Article -
979
Concept of effective Control among the Means of Restoring National Security of Ukraine
Published 2021-07-01Subjects: Get full text
Article -
980
Data-Driven Social Security Event Prediction: Principles, Methods, and Trends
Published 2025-01-01Subjects: Get full text
Article