Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1201
Wireless sensor network for fire detection with network coding to improve security and reliability
Published 2025-02-01“…This article proposes a wireless sensor network (WSN) for fire alarm systems that leverages network coding to enhance system reliability and security. The proposed WSN is designed to comply with European standards, with a particular focus on German standards, and enables the deployment of sensor nodes that automatically construct a robust and reliable network. …”
Get full text
Article -
1202
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: “…beyond birthday‐bound security…”
Get full text
Article -
1203
IMPACT OF ELECTRONIC RECORDS MANAGEMENT SYSTEM ON THE SECURITY OF RECORDS AMONG ADMINISTRATIVE STAFF
Published 2023-12-01Subjects: Get full text
Article -
1204
The India-US Security and Defense Cooperation under Narendra Modi: Challenges and Assessments
Published 2024-12-01Subjects: Get full text
Article -
1205
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks
Published 2014-01-01“…This paper proposes a novel secure data aggregation scheme based on homomorphic primitives in WSNs (abbreviated as SDA-HP). …”
Get full text
Article -
1206
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01“…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
Get full text
Article -
1207
FROM THE VIEW OF THE COMMUNIST PARTY OF VIETNAM TO THE PRACTICE OF BUILDING SOCIAL SECURITY IN DANANG
Published 2017-12-01“…This article analyzes the views of the Communist Party of Vietnam on social security implementation in the current period; Analyzes the situation of social security in Danang and thereby suggests some solutions to improve social security for people in Danang city today.…”
Get full text
Article -
1208
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01Get full text
Article -
1209
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01Subjects: Get full text
Article -
1210
-
1211
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01Subjects: “…Privacy-preserving security…”
Get full text
Article -
1212
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Published 2014-01-01“…In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. …”
Get full text
Article -
1213
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01“…In this paper, we propose a low overhead secure scan design based on scan obfuscation. In this method, to increase the security of the design, we insert a set of fuse-antifuse cells (CF) controlled by the obfuscation key between the scan flip flops (SFF) and add a controller at the scan-out port. …”
Get full text
Article -
1214
Optimal defense strategy based on the mean field game model for cyber security
Published 2019-02-01“…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
Get full text
Article -
1215
5G carrier network data collection and security management evolution ideas
Published 2020-09-01Subjects: Get full text
Article -
1216
AI-based model for securing cognitive IoT devices in advance communication systems
Published 2025-12-01“…These security challenges are exacerbated by IoT devices’ limited computational resources and storage capacities, rendering traditional security protocols ineffective. …”
Get full text
Article -
1217
Designing an internet of things laboratory to improve student understanding of secure IoT systems
Published 2024-01-01“…The instructional lab material has been uploaded to the web portal https://clark.center designated by the National Security Agency for dissemination. Our approach, design, and experimental validation methodology will be useful for educators, researchers, students, and organizations interested in re-skilling their workforce.…”
Get full text
Article -
1218
Quantitative threat situational assessment method for higher secure attribute value device
Published 2020-10-01Subjects: Get full text
Article -
1219
Secure authentication enhancement scheme for seamless handover and roaming in space information network
Published 2019-06-01Subjects: Get full text
Article -
1220
TECHNICAL EDUCATION AS A PANACEA FOR CURBING BANDITRY AND SECURITY CHALLENGES IN NORTHWEST NIGERIA
Published 2025-01-01Subjects: Get full text
Article