Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1321
Organizational Flexibility and Financial Performance: A Case Study of Social Security Branches in Tehran
Published 2021-05-01Subjects: Get full text
Article -
1322
Water security in North Carolina’s most economically insecure county: a case study
Published 2025-01-01Subjects: “…water security…”
Get full text
Article -
1323
Secure and efficient token based roaming authentication scheme for space-earth integration network
Published 2018-05-01“…Aiming at the problem of prolongation and instability of satellite and terrestrial physical communication links in the space-earth integration network,a two-way token based roaming authentication scheme was proposed.The scheme used the characteristics of the computing capability of the satellite nodes in the network to advance the user authentication process from the network control center (NCC) to the access satellite.The satellite directly verified the token issued by the NCC to verify the user's identity.At the same time,the token mechanism based on the one-way accumulator achieved the user's dynamic join,lightweight user self-service customization and billing,and the introduction of Bloom Filter enabled effective user revocation and malicious access management.Compared with the existing scheme,the scheme can guarantee the security of roaming authentication and significantly reduce the calculation and communication overhead of the authentication and key negotiation process.…”
Get full text
Article -
1324
Impact of Fisheries Exports on the Participation of Fisheries in Ensuring Food Security of the Country and the Arctic Region
Published 2024-12-01Subjects: Get full text
Article -
1325
Text Categorization Approach for Secure Design Pattern Selection Using Software Requirement Specification
Published 2018-01-01Subjects: Get full text
Article -
1326
Femtosecond Laser‐Induced Recrystallized Nanotexturing for Identity Document Security With Physical Unclonable Functions
Published 2025-01-01“…Abstract Counterfeit identity (ID) documents pose a serious threat to personal credit and national security. As a promising candidate, optical physical unclonable functions (PUFs) offer a robust defense mechanism against counterfeits. …”
Get full text
Article -
1327
Advanced Malware Detection: Integrating Convolutional Neural Networks with LSTM RNNs for Enhanced Security
Published 2024-12-01Get full text
Article -
1328
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
Published 2025-01-01Subjects: Get full text
Article -
1329
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01Subjects: “…5G security…”
Get full text
Article -
1330
Evaluation of the policy program for strengthening local food commodities for sustainable food security in papua
Published 2024-06-01Subjects: Get full text
Article -
1331
-
1332
Water management for rice production: a key component of food security in East Africa
Published 2025-02-01“…Abstract Water is a valuable resource for rice production, which is an integral component of food security in East Africa (EA). Rice farming is expanding in the region, with up to 90% produced on smallholder farms using traditional flooding and rain-fed methods, vulnerable to climate change and variability. …”
Get full text
Article -
1333
-
1334
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
Get full text
Article -
1335
Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
Published 2020-03-01“…In order to ensure data security for deduplication, different data should be assigned with different privacy levels. …”
Get full text
Article -
1336
Legal Certainty Regarding the Conversion of Land Certificates To An Electronic System Based On Security Principles
Published 2024-11-01Subjects: “…security guarantee,…”
Get full text
Article -
1337
Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college
Published 2019-06-01Subjects: “…cyberspace security…”
Get full text
Article -
1338
Concepts and types of administrative and legal means of ensuring economic security by the National Police of Ukraine
Published 2018-12-01“…The conducted research should become the basis for studying the problems of certain administrative and legal means of ensuring economic security by the National Police of Ukraine, which is a perspective direction for further scientific research.…”
Get full text
Article -
1339
DIGITAL SECURITY IN EDUCATIONAL TRAINING PROGRAMS: A STUDY BASED ON FUTURE TEACHERS’ PERCEPTIONS
Published 2023-06-01Subjects: Get full text
Article -
1340
Social leadership and authority in the field of national and military security: problems of formation in the digital world
Published 2021-04-01Subjects: Get full text
Article