Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1401
The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers)
Published 2008-05-01“…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
Get full text
Article -
1402
Distributed key sharing based scheme for security clustering in unattended wireless sensor network
Published 2015-05-01“…For unattended wireless sensor network (UWSN),considering the collecting and efficiency and security prob-lems,a secure clustering scheme for UWSN was proposed,which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity,balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm,in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes,and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing,and more than 95% attacks are tol-erated when compromised nodes are less than 20%.…”
Get full text
Article -
1403
South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions
Published 2024-12-01Subjects: “…elections, voters, technology, mobile apps, data privacy, data security, South Africa, Electoral Commission, IEC…”
Get full text
Article -
1404
A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography
Published 2021-01-01“…Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. …”
Get full text
Article -
1405
Physical-layer security transmission method based on spatial modulation with finite alphabet inputs
Published 2015-02-01Subjects: “…wireless physical-layer security…”
Get full text
Article -
1406
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01“…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
Get full text
Article -
1407
An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era
Published 2021-01-01“…With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. …”
Get full text
Article -
1408
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
Published 2023-06-01Subjects: Get full text
Article -
1409
Approach for information systems security situation evaluation using improved FAHP and Bayesian network
Published 2009-01-01“…An approach for the information systems security situation assessment based on an improved FAHP and Bayesian network was proposed to solve the problem of obtaining the risk grade.The improved FAHP was used to quantify the factor of attack severity which was hard to scale.Simultaneously, the conditional probability matrices for all fac-tors were defined with the expert knowledge.Then a model for information security situation assessment was established by the Bayesian network inference, and the corresponding approach was presented.Finally, an illustrative instance was given to demonstrate its rationality and feasibility.Thus it may provide a new way for assessing information systems security situation.…”
Get full text
Article -
1410
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01“…Patient privacy data security is a pivotal area of research within the burgeoning field of smart healthcare. …”
Get full text
Article -
1411
The Role of International Arbitration in Maintaining World Peace and Security with an Emphasis on Non- State Actors
Published 2024-03-01Subjects: “…world peace and security…”
Get full text
Article -
1412
Provably secure biometric and PUF-based authentication for roaming service in global mobility network
Published 2025-02-01“…However, while GLOMONET offers numerous benefits, it also present security challenges that need to be addressed. To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
Get full text
Article -
1413
Britain’s Indo-Pacific Security and Trade Policies: Continuity and Change Under the Labour Government
Published 2024-12-01“…The United Kingdom’s main motivation for its engagement in the Indo-Pacific is commercial, alongside its contributions to regional security. In July 2024, a Labour government replaced the Conservative government. …”
Get full text
Article -
1414
ASSESSMENT OF SECURITY OPERATIONS ON TACKLING BANDITRY FOR SUSTAINABLE NATIONAL DEVELOPMENT IN NORTH-WESTERN NIGERIA
Published 2024-01-01Subjects: Get full text
Article -
1415
A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network
Published 2014-02-01“…In addition, a set of security keys is used to prevent illegal access to the network. …”
Get full text
Article -
1416
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…The ongoing challenge in the world of blockchain technology is finding a solution to the trilemma that involves balancing decentralization, security, and scalability. This paper introduces a pioneering blockchain architecture designed to transcend this trilemma, uniting advanced cryptographic methods, inventive security protocols, and dynamic decentralization mechanisms. …”
Get full text
Article -
1417
2D Sin-Cos-Henon Map for Color Image Encryption with High Security
Published 2022-01-01“…In this paper, a high security color image encryption algorithm is proposed by 2D Sin-Cos-Hénon (2D-SCH) system. …”
Get full text
Article -
1418
Homeland security video surveillance system utilising the internet of video things for smart cities
Published 2021-07-01Subjects: Get full text
Article -
1419
Explanation of Security Sequences of Climate Change (Case Study: Iran’s Central Drainage Basin)
Published 2017-09-01Subjects: Get full text
Article -
1420
Data sharing scheme supporting secure outsourced computation in wireless body area network
Published 2017-04-01Subjects: Get full text
Article