Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1121
Integrating ecological and recreational functions to optimize ecological security pattern in Fuzhou City
Published 2025-01-01Subjects: “…Ecological security pattern…”
Get full text
Article -
1122
An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers
Published 2015-01-01“…Security and secrecy are some of the important concerns in the communications world. …”
Get full text
Article -
1123
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01“…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. …”
Get full text
Article -
1124
Research and applications of intelligent public security information system based on big data
Published 2016-12-01Subjects: Get full text
Article -
1125
Securing Brain-to-Brain Communication Channels Using Adversarial Training on SSVEP EEG
Published 2025-01-01Subjects: Get full text
Article -
1126
Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers
Published 2020-05-01Subjects: “…physical layer security…”
Get full text
Article -
1127
Blockchain-powered wireless sensor networks: enhancing security and privacy in the IoT era
Published 2023-06-01Subjects: Get full text
Article -
1128
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
1129
Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors
Published 2024-01-01Subjects: Get full text
Article -
1130
NATO’s partnership policy: From the military alliance to the security community, and back again
Published 2024-07-01Subjects: Get full text
Article -
1131
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01Subjects: Get full text
Article -
1132
MANAGEMENT OF THE QUALITY OF AGRICULTURAL PRODUCTS IN THE AGRARIAN AI ECONOMY IN SUPPORT OF FOOD SECURITY
Published 2025-03-01Subjects: Get full text
Article -
1133
Intensified Drought Threatens Future Food Security in Major Food-Producing Countries
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
1134
Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher
Published 2023-04-01“…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
Get full text
Article -
1135
-
1136
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01Subjects: Get full text
Article -
1137
TURKEY’S SEARCH FOR SECURITY AND THE SOVIET FACTOR DURİNG THE SECOND WORLD W AR
Published 2014-05-01Subjects: “…turkey’s search ;for security ; the soviet factor duri̇ng the second world w ar…”
Get full text
Article -
1138
THE TRANSFORMATIONAL EVOLUTION OF THE ROMANIAN INTELLIGENCE SERVICE-SRI IN THE LIGHT OF THE SECURITY SECTOR REFORM
Published 2024-12-01Subjects: “…security sector reform…”
Get full text
Article -
1139
Design and application research on management information system security architecture in digital campus
Published 2014-10-01Subjects: Get full text
Article -
1140
DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks
Published 2015-11-01“…In this work we propose a Dynamic Security System to be applied in the shared sensor network context. …”
Get full text
Article