Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1181
New security model for cross-realm C2C-PAKE protocol
Published 2008-01-01Subjects: Get full text
Article -
1182
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01“…Further different issues related specifically to the Internet of Things environment are discussed and the causes and effects pertaining to the security breach for Internet of Things are identified. …”
Get full text
Article -
1183
Investigating the security consequences of climate change on Iran with a Good Governance approach
Published 2024-12-01“…Due to its location in low latitudes, Iran is among the countries that has not been spared from the security consequences of climate change. The present study seeks to answer two questions: 1) What are the security consequences of climate change on Iran and which components have the greatest impact on Iran? …”
Get full text
Article -
1184
Interference alignment based secure transmission scheme in multi-user interference networks
Published 2023-06-01Subjects: Get full text
Article -
1185
Water Security in the Context of Sustainable Management of Transboundary Water Resources in the Caspian Region
Published 2023-11-01Subjects: “…water security…”
Get full text
Article -
1186
Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency
Published 2023-01-01“…Energy-efficient data transmission in PA via sensing technology is possible only when additional security measures are synchronized. Nevertheless, security considerations often introduce additional overhead. …”
Get full text
Article -
1187
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
Get full text
Article -
1188
-
1189
APPROACH TO ECONOMIC SECURITY ORGANIZATION BASED ON PROBLEM-SOLVING TYPE CLOSED CIRCLE
Published 2016-07-01Subjects: “…economic security of organization…”
Get full text
Article -
1190
Design and Implementation of an Ethical AI-Based Teaching Assistant for IoT Security Education
Published 2024-12-01Subjects: Get full text
Article -
1191
Quantitative Research on Water Security in Zhengzhou City Based on SD-BC Theory
Published 2020-01-01Subjects: Get full text
Article -
1192
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
1193
Legal regulation features of legal liability of the Bureau of Economic Security of Ukraine employees
Published 2023-09-01Subjects: Get full text
Article -
1194
Designing a security-oriented leadership model of Mazandaran University of Medical Sciences
Published 2024-11-01Subjects: “…security-oriented…”
Get full text
Article -
1195
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…However, TES is facing critical challenges in security and economics. Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
Get full text
Article -
1196
Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key
Published 2018-05-01“…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
Get full text
Article -
1197
Risk factors for human infection with mpox among the Mexican population with social security
Published 2025-01-01Get full text
Article -
1198
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
1199
Secure Two-Party Decision Tree Classification Based on Function Secret Sharing
Published 2023-01-01“…This paper proposes a novel framework for secure two-party decision tree classification that enables collaborative training and evaluation without leaking sensitive data. …”
Get full text
Article -
1200
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Published 2025-01-01Get full text
Article