Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1221
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
1222
RETRACTED: Application of simulation modeling in ensuring economic security in feed additives production
Published 2024-01-01Get full text
Article -
1223
The Effectiveness of Emotion-Focused Therapy on Psychological Security in Women Involved in Domestic Violence
Published 2024-03-01Subjects: Get full text
Article -
1224
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Get full text
Article -
1225
Management of receivables and payables as an element of ensuring the economic security of an enterprise: practical aspects
Published 2023-02-01Subjects: Get full text
Article -
1226
Economic security as a driver of Russian exclave development in alignment with national interests
Published 2024-01-01Subjects: “…economic security…”
Get full text
Article -
1227
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
Published 2025-01-01Get full text
Article -
1228
An Analysis of the Impact of the Syrian Crisis on Turkey’s Politic-Military, Social and Economic Security
Published 2020-06-01Subjects: Get full text
Article -
1229
A network security situation prediction method based on hidden Markov model
Published 2015-12-01Subjects: “…network security situation prediction…”
Get full text
Article -
1230
Consequences of changing regional integration on environmental development, agricultural markets, and food security
Published 2023-10-01Subjects: Get full text
Article -
1231
Modeling and verifying based on timed automata of Internet of things gateway security system
Published 2018-03-01Subjects: Get full text
Article -
1232
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01“…In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.…”
Get full text
Article -
1233
Business or Security? Goals and Decision-Making Inside the French Oil Policy of the 1920s
Published 2022-03-01Subjects: Get full text
Article -
1234
Methods of security situation prediction for industrial internet fused attention mechanism and BSRU
Published 2022-02-01Subjects: Get full text
Article -
1235
-
1236
Research on the chaotic secure communication of the phase-space symmetric Lorenz oscillator group
Published 2019-05-01Subjects: Get full text
Article -
1237
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
1238
Research on Security Algorithm for Crossing Heterogeneous Network Based on Unified Communication Technology
Published 2013-12-01“…Due to the unified protocol specification, encryption, and firewalls and other security measures at present, communication within the network environment are in good usability and security in heterogeneous network environment. …”
Get full text
Article -
1239
EBS-based efficient and secure group key management in wireless sensor networks
Published 2009-01-01“…To achieve the secure group communication in wireless sensor networks(WSN), a EBS-based group key management scheme was presented.First, the network topology was simplified by combining the chain-clusters and the star-clusters.Next, to prevent the adversary uncover all the administrative keys by a few colluding sensors, the number of sensors needed to capture WSN was increased.Then, the sensors of key combinations distribution were sorted through a coloring algorithm.Based on all these operations, the presented scheme distributed the administrative keys based on the hamming distance and EBS.Furthermore, the approaches handling the join event and leave event were described.Two experiments were performed to study the potential for collusions and the influence of size of compromised nodes on the effectiveness against collusions.Simulation results demonstrate that the presented scheme boosts the WSN’ resilience to attacks.The performance evaluation on join event and leave event shows that the number of key-updating messages and storage of sensors in the proposed scheme are fewer than those of SHELL.…”
Get full text
Article -
1240
Secure performance analysis of WCDMA systems over correlated Nakagami fading channels
Published 2018-10-01Subjects: “…physical layer security…”
Get full text
Article