Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1141
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…multi-level security…”
Get full text
Article -
1142
-
1143
Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks
Published 2018-01-01“…To deal with this problem, we propose a secure and efficient scheme for cluster-based query processing in wireless sensor networks. …”
Get full text
Article -
1144
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01“…IET Information Security…”
Get full text
Article -
1145
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01“…Attribute-based access control is fundamentally dependent on the secure service attribute calibration of object sources. …”
Get full text
Article -
1146
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Published 2024-03-01“…Furthermore, this study presents a security model that aims to strengthen the resolution system based on data transmission security. …”
Get full text
Article -
1147
Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection
Published 2015-06-01Subjects: Get full text
Article -
1148
Study on chaos phase space synchronous rotation and distinguish switching security communication
Published 2016-10-01Subjects: Get full text
Article -
1149
Research on enhancing the security of IoT terminals based on non-IP and SCEF technology
Published 2017-02-01Subjects: Get full text
Article -
1150
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
1151
Secure communication approach for Internet of things based on C-RAN fronthaul compression
Published 2018-09-01Subjects: Get full text
Article -
1152
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01“…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
Get full text
Article -
1153
The Long-Term Effects of Reforming Social Security to Relieve Low-Income Households
Published 2021-10-01“…Abstract In this paper, we use a macroeconomic model to evaluate two reform proposals that, first, abolish the exemption from social security contributions for marginal employment (“mini jobs”) and, second, reduce social security contributions for low-income earners. …”
Get full text
Article -
1154
Cross-border cooperation as a key element of internal security – selected aspects
Published 2024-09-01Subjects: “…security…”
Get full text
Article -
1155
Correlation of the terms “social order” and “public order”, “social security” and “public safety”
Published 2024-06-01Subjects: “…national security…”
Get full text
Article -
1156
Bankruptcy forecasting in enterprises and its security using hybrid deep learning models
Published 2025-12-01“…Cyber Security and Applications…”
Get full text
Article -
1157
Secure opportunistic access control in D2D-enabled cellular network
Published 2018-01-01“…The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.…”
Get full text
Article -
1158
Editorial: Multilevel medical security systems and big data in healthcare: trends and developments
Published 2025-01-01Subjects: “…multilevel medical security systems…”
Get full text
Article -
1159
A survey of physical layer security in space-air-ground communication and networks
Published 2020-09-01Subjects: Get full text
Article -
1160
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies
Published 2025-01-01Subjects: Get full text
Article