Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
941
Management of labor behavior of employees as a factor of economic security of the organization
Published 2019-09-01Get full text
Article -
942
Physical Layer Security Schemes in Space-Integrated-Ground Information Network
Published 2020-12-01Subjects: Get full text
Article -
943
Research on formal security policy model specification and its formal analysis
Published 2006-01-01Subjects: “…security policy model…”
Get full text
Article -
944
Digital economic security of Russian organizations, industries and Russia as a whole
Published 2019-09-01Subjects: “…digital economic security of the organization…”
Get full text
Article -
945
STBM: secure and trustworthy blockchain-based model for cybersecurity service transactions
Published 2024-09-01“…To overcome the numerous challenges faced by traditional models of cybersecurity service transactions, adapt to the needs of industrial digitalization, and address the inconveniences and opacity of cybersecurity service transactions, a secure and trustworthy blockchain-based model for cybersecurity service transactions was proposed, which could provide a secure, efficient, and controllable means of transaction for cybersecurity services. …”
Get full text
Article -
946
Cloud Computing Security Construction Analysis of China Telecom Business Platform
Published 2013-04-01Subjects: Get full text
Article -
947
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01“…The security of this new scheme, which was founded on the unforgeability and the hardness of the SM2 signature scheme, was demonstrated to meet the requirements of the newly proposed security model. …”
Get full text
Article -
948
Foreign terrorist fighters as a potential security problem of the Republic of Serbia
Published 2024-01-01“…The paper analyzes the phenomenon of foreign terrorist fighters, who can represent a potential security problem for the Republic of Serbia. It is believed that in the period from 2012 to 2016, more than 1,200 people from the Western Balkan region (including Serbia, as well). …”
Get full text
Article -
949
Organization of the National Police activities as a subject of the security and defense sector
Published 2022-06-01Subjects: “…security sector…”
Get full text
Article -
950
Research towards IoT-oriented universal control system security model
Published 2012-11-01Subjects: Get full text
Article -
951
Energy Efficiency Maximization with Optimal Beamforming in Secure MISO CRNs with SWIPT
Published 2021-01-01Get full text
Article -
952
Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection
Published 2017-01-01“…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
Get full text
Article -
953
Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results
Published 2011-01-01“…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
Get full text
Article -
954
Research category and future development trend of data elements circulation and security
Published 2024-05-01Subjects: Get full text
Article -
955
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01Subjects: Get full text
Article -
956
New adaptively secure key-policy attribute-based encryption scheme
Published 2012-09-01Subjects: Get full text
Article -
957
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article -
958
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: “…universally composable security…”
Get full text
Article -
959
Security environment of the state in the context of the Ministry of Internal Affairs of Ukraine activities
Published 2023-06-01Subjects: “…security…”
Get full text
Article -
960
New construction of secure range query on encrypted data in cloud computing
Published 2015-02-01“…To solve the information leakage problem resulting from several assertions of previous range query solutions,there is a secure range query scheme with one assertion (SRQSAE scheme),and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented,and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword,and it achieves high level needs of security without losing efficiency.…”
Get full text
Article