-
361
Methods for Selection of Network Security Systems in accordance with Information Security Policies
Published 2015-03-01Subjects: “…information security policy…”
Get full text
Article -
362
What Physical Layer Security Can Do for 6G Security
Published 2023-01-01Subjects: Get full text
Article -
363
What kind of cyber security? Theorising cyber security and mapping approaches
Published 2018-05-01Subjects: “…Cyber security…”
Get full text
Article -
364
Drive Encryption and Secure Login to a Secure Workstation for Special Applications
Published 2012-09-01Subjects: Get full text
Article -
365
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol;implementations security;Swift language;formal analysis;model extraction…”
Get full text
Article -
366
How to Study Gender in International Security? An Introduction to Feminist Security Studies
Published 2020-03-01Subjects: Get full text
Article -
367
Investigation of economic security in terms of relations “innovation security — innovation culture”
Published 2012-12-01Subjects: “…region’s economic security…”
Get full text
Article -
368
US foreign policy : from security to international security cooperation based on
Published 2008-12-01Get full text
Article -
369
WEB SITE SECURITY DISCLOSURE POLICIES OF ONLINE SECURITIES FIRMS: ARE THEY SATISFACTORY?
Published 2007-01-01Get full text
Article -
370
Security Substrate Based Security Management and Control Mecbanism of Reconfigurable Network
Published 2014-07-01Subjects: “…next generation internet design;reconfigurable network;security substrate;dynamic security model…”
Get full text
Article -
371
Security & safety issues and endogenous security for intelligent connected vehicles
Published 2024-12-01Subjects: Get full text
Article -
372
Secure Physical Layer Network Coding versus Secure Network Coding
Published 2021-12-01Subjects: Get full text
Article -
373
Regionalizing security and decentralizing Nigeria’s security architecture: What is the position of the media?
Published 2021-10-01“… Background: The debate on decentralization of Nigeria’s internal security architecture is not a recent one and the clamour for state and community policing have not died down either. …”
Get full text
Article -
374
A Review on Secure Data Deduplication: Cloud Storage Security Issue
Published 2022-07-01“…Clients uploading their data on cloud are most concerned about the security, integrity, privacy and confidentiality of their data. …”
Get full text
Article -
375
Strategic-security trends and projection of strategic security frameworks of the Republic of Serbia
Published 2017-01-01Subjects: “…strategic-security trends…”
Get full text
Article -
376
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
Published 2019-07-01Subjects: Get full text
Article -
377
«Danger: Security»! Securitization Theory and the Paris School of International Security Studies
Published 2022-03-01Subjects: Get full text
Article -
378
THE ROLE AND PLACE OF INFORMATION SECURITY IN THE OVERALL SYSTEM OF THE STATE'S NATIONAL SECURITY
Published 2022-12-01Subjects: “…national security…”
Get full text
Article -
379
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01“…By analyzing the security of strongly secure certificateless signature scheme proposed by Wang Yafei et al, the problem that the scheme could not resist public key replacement attack under dishonest KGC was pointed out. …”
Get full text
Article -
380
ASSESSMENT OF THE LEVEL OF BANKING SECURITY IN UKRAINE AS THE COMPONENT OF FINANCIAL SECURITY IN UKRAINE
Published 2021-12-01Subjects: “…banking security…”
Get full text
Article