Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1341
Wireless body area network: Architecture and security mechanism for healthcare using internet of things
Published 2025-01-01“…The data generated by small sensor devices need strong security methods for secure transmission over a public network. …”
Get full text
Article -
1342
Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks
Published 2015-01-01“…In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. …”
Get full text
Article -
1343
A plithogenic statistical approach to digital security measures and emotional health in childhood and adolescence
Published 2024-11-01Subjects: Get full text
Article -
1344
-
1345
UN SECRETARY-GENERAL NORMATIVE CAPABILITY TO INFLUENCE THE SECURITY COUNCIL DECISION-MAKING PROCESS
Published 2016-12-01Subjects: Get full text
Article -
1346
Unified operation monitoring and security warning platform based on big data in energy group
Published 2018-05-01“…With the increasing of information assets of energy group,in order to effectively cope with information security risks,using the big data and the intersecting confirmation mechanics of multi-source data,a monitoring and security warning platform was designed for information devices and application systems in energy group.By the global analysis of big multi-source data,the real-time awareness of risk and situation could be achieved,which was valuable for the progress of operation and management level of information system and timely warning of the spread of information risk to the power system.…”
Get full text
Article -
1347
-
1348
A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
Published 2012-09-01“…In this paper, after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme, we present an efficient public auditing scheme with privacy property. The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.…”
Get full text
Article -
1349
Secure transmission scheme for millimeter-wave Internet of vehicles with multiple base stations and users
Published 2024-08-01Subjects: Get full text
Article -
1350
A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks
Published 2015-01-01“…So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. …”
Get full text
Article -
1351
Solvable constraints and unsolvable limits to global climate adaptation in coastal Indigenous food security
Published 2025-01-01Subjects: Get full text
Article -
1352
Design of the Monitoring System for Communication Satellite Information Security Based on Spaceborne Network Probe
Published 2023-06-01Subjects: Get full text
Article -
1353
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1354
Strong incidence domination in some operations of fuzzy incidence graphs and application in security allocation
Published 2024-12-01“…Additionally, the paper discusses an application of SID in security allocation.…”
Get full text
Article -
1355
-
1356
A social security bonus for a new start out of the mini-job crisis
Published 2021-10-01Get full text
Article -
1357
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
Published 2011-01-01“…BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.…”
Get full text
Article -
1358
Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction
Published 2023-01-01“…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
Get full text
Article -
1359
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
Published 2017-10-01Subjects: “…physical-layer security…”
Get full text
Article -
1360
Retracted: Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm
Published 2023-01-01Get full text
Article