Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
441
METHODICAL APPROACHES TO THE DEVELOPMENT OF THE ECONOMIC SECURITY INDICATORS OF THE ORGANIZATION
Published 2018-11-01Subjects: “…economic security…”
Get full text
Article -
442
Secure interface architecture for the software defined system on wafer
Published 2024-10-01Subjects: Get full text
Article -
443
Research on coreference resolution technology of entity in information security
Published 2020-02-01Subjects: Get full text
Article -
444
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: Get full text
Article -
445
Social financial information security risk analysis and prevention
Published 2016-03-01Subjects: Get full text
Article -
446
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
447
Security of the deployment of SDN-based IoT using blockchain
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
448
Correction: A lightweight and secure protocol for teleworking environment.
Published 2024-01-01Get full text
Article -
449
Energy-saving privacy data secure aggregation method
Published 2014-11-01Subjects: Get full text
Article -
450
Development of industrial internet platform and its security challenges
Published 2020-03-01Subjects: Get full text
Article -
451
Robust image hiding algorithm for secure multimodal biometrics
Published 2016-09-01“…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
Get full text
Article -
452
A Novel FM-DCSK Secure Communication System
Published 2015-01-01Subjects: “…chaos secure communication…”
Get full text
Article -
453
Research on IMS Core Network Security Index System
Published 2014-08-01Subjects: Get full text
Article -
454
Research on relay related handover security in LTE-A
Published 2013-08-01Subjects: Get full text
Article -
455
Secure cross-domain communication mechanism for Web mashups
Published 2012-06-01“…Many methods were used in cross-domain communication,whereas they were hardly to meet the security and high performance requirements.To this end,a secure cross-domain communication(SCDC)mechanism was proposed for Web mashups.It encapsulates content from different trust domains as secure components,achieves cross-domain communication with layered communication stack,and shares fine-grained objects by wrapping objects.SCDC mechanism supports secure cross-domain communication,shares objects between mashups and components without any browser modifications.Experiments show that the mechanism improves the communication efficiency more than five-fold,and only incurs limited overhead.…”
Get full text
Article -
456
Increasing the contribution of personal gardening to providing food security
Published 2022-11-01Subjects: Get full text
Article -
457
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
458
Status of water security in inland South African cities
Published 2020-12-01Subjects: “…Water demand, Water security, South Africa, Water supply…”
Get full text
Article -
459
Research of public infrastructure system and security policy in cyberspace
Published 2021-12-01“…Considering the key elements, such as object, resources, activities, and other equipment, as same as system, data, environmental and other aspects of demand, the public infrastructure system and security policy between physical space and cyberspace were taken as a basic point.A scientific system of public infrastructure in cyberspace was constructed.From the perspective of dual authentication of management authentication and application authentication, some corresponding safety policies and implementation suggestions were given from the aspects of user/device management and identity authentication.…”
Get full text
Article -
460
Sustainable intensification of agriculture: the foundation for universal food security
Published 2025-01-01“…To achieve universal food security, SI must be accompanied by complementary investments in market infrastructure, postharvest stewardship, healthy diets, and social protection. …”
Get full text
Article