Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1101
Integration of Islamic Jurisprudence Principles within the UN Global Human Security Framework
Published 2024-12-01Subjects: Get full text
Article -
1102
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Published 2015-02-01“…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. …”
Get full text
Article -
1103
The organisational structure of the economic security service of the enterprise and the main functions of its divisions
Published 2022-07-01Subjects: Get full text
Article -
1104
Cyber Security of the Economy and Public Finances: Historiography and Post-War Trajectory of Development
Published 2024-06-01Subjects: Get full text
Article -
1105
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01“…Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with anonymous identity without using smart cards was presented.The security and computational efficiency of our scheme were improved by confusing the anonymous identity with user’s password and taking use of the timestamp.According to comparisons with other password authentication schemes without smart cards,our scheme not only fixes weaknesses of Rhee-Kwon-Lee’s scheme,but also satisfies all the security requirements for ideal password authentication without smart cards and is the better one in security performance and computational cost.…”
Get full text
Article -
1106
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01“…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
Get full text
Article -
1107
NON-CONTRIBUTORY SOCIAL SECURITY APPLICATION FOR ELDERLY AND INDIVIDUALS WITH DISABILITIES’: THE CASE OF TURKEY
Published 2021-11-01Subjects: “…social security…”
Get full text
Article -
1108
Automatic generation of AppArmor security policies based on large language models
Published 2024-06-01Subjects: Get full text
Article -
1109
Integrating ecological and recreational functions to optimize ecological security pattern in Fuzhou City
Published 2025-01-01Subjects: “…Ecological security pattern…”
Get full text
Article -
1110
An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers
Published 2015-01-01“…Security and secrecy are some of the important concerns in the communications world. …”
Get full text
Article -
1111
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01“…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. …”
Get full text
Article -
1112
Research and applications of intelligent public security information system based on big data
Published 2016-12-01Subjects: Get full text
Article -
1113
Securing Brain-to-Brain Communication Channels Using Adversarial Training on SSVEP EEG
Published 2025-01-01Subjects: Get full text
Article -
1114
Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers
Published 2020-05-01Subjects: “…physical layer security…”
Get full text
Article -
1115
Blockchain-powered wireless sensor networks: enhancing security and privacy in the IoT era
Published 2023-06-01Subjects: Get full text
Article -
1116
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
1117
Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors
Published 2024-01-01Subjects: Get full text
Article -
1118
NATO’s partnership policy: From the military alliance to the security community, and back again
Published 2024-07-01Subjects: Get full text
Article -
1119
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01Subjects: Get full text
Article -
1120
MANAGEMENT OF THE QUALITY OF AGRICULTURAL PRODUCTS IN THE AGRARIAN AI ECONOMY IN SUPPORT OF FOOD SECURITY
Published 2025-03-01Subjects: Get full text
Article