Journal articles on the topic 'And forward security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'And forward security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kerigan-Kyrou, Dinos. "2020 Transatlantic Security Jam: Resilience Going Forward." Connections: The Quarterly Journal 19, no. 3 (2020): 47–54. http://dx.doi.org/10.11610/connections.19.3.03.
Full textHearn, J. "Moving forward? [digital security]." IEEE Security & Privacy 1, no. 2 (2003): 70–71. http://dx.doi.org/10.1109/msecp.2003.1193215.
Full textOmahe, Oscar. "Kenya's National Security Resilience: Way Forward." Shivapuri Journal 25, no. 1 (2024): 117–29. http://dx.doi.org/10.3126/shivapuri.v25i1.63438.
Full textV., Deepika, and B. M. "Optimal Data Sharing with Forward Security." International Journal of Computer Applications 152, no. 7 (2016): 10–13. http://dx.doi.org/10.5120/ijca2016911892.
Full textSjoberg, Laura. "Looking Forward, Conceptualizing Feminist Security Studies." Politics & Gender 7, no. 04 (2011): 600–604. http://dx.doi.org/10.1017/s1743923x11000420.
Full textWiseman, Simon. "Database Security: Retrospective and Way Forward." Information Security Technical Report 6, no. 2 (2001): 30–43. http://dx.doi.org/10.1016/s1363-4127(01)00205-9.
Full textGuo, Sixu, Huizheng Geng, Li Su, and Xinyue Zhang. "Boolean Searchable Encryption Scheme Supporting Forward Security." Journal of Physics: Conference Series 2337, no. 1 (2022): 012011. http://dx.doi.org/10.1088/1742-6596/2337/1/012011.
Full textReddy N, Sahana, Leena N. Fukey, and Varynia Wankhar. "Ethnic Food: The Food Way Forward." ECS Transactions 107, no. 1 (2022): 13547–54. http://dx.doi.org/10.1149/10701.13547ecst.
Full textMuñiz, Madeline González, and Peeter Laud. "Strong Forward Security in Identity-Based Signcryption." Journal of Discrete Mathematical Sciences and Cryptography 16, no. 4-5 (2013): 235–58. http://dx.doi.org/10.1080/09720529.2013.821367.
Full textPerry, Rod. "Information security: The way forward for business." Computer Audit Update 1990, no. 3 (1990): 2–9. http://dx.doi.org/10.1016/s0960-2593(05)80041-2.
Full textKonkolewsky, Hans-Horst. "Looking forward to social security for all." International Social Security Review 60, no. 2-3 (2007): 197–200. http://dx.doi.org/10.1111/j.1468-246x.2007.00276.x.
Full textVachon, Phil. "Security Mismatch." Queue 21, no. 3 (2023): 23–28. http://dx.doi.org/10.1145/3606028.
Full textLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (2023): 1159. http://dx.doi.org/10.3390/e25081159.
Full textGill, Sumeet, and Renu Devi. "Enhancing Cloud Data Security using Artificial Neural Networks for Users’ Account Hijacking Security Threats." Indian Journal Of Science And Technology 17, no. 34 (2024): 3538–52. http://dx.doi.org/10.17485/ijst/v17i34.2339.
Full textBoyen, Xavier, and Thomas Haines. "Forward-Secure Linkable Ring Signatures from Bilinear Maps." Cryptography 2, no. 4 (2018): 35. http://dx.doi.org/10.3390/cryptography2040035.
Full textKaponig, Hermann. "Austria’s National Cyber Security and Defense Policy: Challenges and the Way Forward." Connections: The Quarterly Journal 19, no. 1 (2020): 21–37. http://dx.doi.org/10.11610/connections.19.1.03.
Full textYou, Ilsun, Gunwoo Kim, Seonghan Shin, Hoseok Kwon, Jongkil Kim, and Joonsang Baek. "5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy." Sensors 24, no. 1 (2023): 159. http://dx.doi.org/10.3390/s24010159.
Full textHe, Lei, Yong Gan, Na Na Li, and Tao Zhang. "A Revised Serverless Authentication Protocol with Forward Security for RFID." Applied Mechanics and Materials 29-32 (August 2010): 2267–72. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2267.
Full textAl Balushi, Taiseera, Saqib Ali, and Osama Rehman. "Economics of Cyber Security and the Way Forward." International Journal of Cyber Warfare and Terrorism 6, no. 4 (2016): 41–57. http://dx.doi.org/10.4018/ijcwt.2016100104.
Full textLi, Yunfa. "Research on Group Signature Scheme with Forward Security." Journal of Computer Research and Development 43 (2006): 2069. http://dx.doi.org/10.1360/crad20061206.
Full textBurmester, Mike, and Jorge Munilla. "Lightweight RFID authentication with forward and backward security." ACM Transactions on Information and System Security 14, no. 1 (2011): 1–26. http://dx.doi.org/10.1145/1952982.1952993.
Full textSjoberg, Laura. "What, and where, is Feminist Security Studies?" Journal of Regional Security 11, no. 2 (2016): 143–61. http://dx.doi.org/10.11643/issn.2217-995x162sps66.
Full textZhang, Ping, Yamin Li, Muhua Liu, Youlin Shang, and Zhumu Fu. "An ECC-Based Digital Signature Scheme for Privacy Protection in Wireless Communication Network." Wireless Communications and Mobile Computing 2022 (April 13, 2022): 1–9. http://dx.doi.org/10.1155/2022/1977798.
Full textFarr, Kathryn Ann. "Classification for Female Inmates: Moving Forward." Crime & Delinquency 46, no. 1 (2000): 3–17. http://dx.doi.org/10.1177/0011128700046001001.
Full textB, Mohamed Ibrahim, and Mohamed Shanavas A.R. "An Approach to Predict SOA Security Vulnerabilities using Feed Forward Artificial Neural Networks." SIJ Transactions on Computer Networks & Communication Engineering 03, no. 03 (2015): 01–05. http://dx.doi.org/10.9756/sijcnce/v3i3/03040090102.
Full textZhao, Chenchen. "API Common Security Threats and Security Protection Strategies." Frontiers in Computing and Intelligent Systems 10, no. 2 (2024): 29–33. http://dx.doi.org/10.54097/k5djs164.
Full textNauta, Chelsea, Christopher J Teodorski, Ryan Pusins, Gary W Holland, and Alberto Socorro. "TECHGENICS’ DATA SECURITY COMPLIANCE." Muma Case Review 5 (2020): 001–27. http://dx.doi.org/10.28945/4563.
Full textSheikh, Mahmood A., Syed Muhammad Bin Ahmed, and Afrasiab Ahmed Rana. "ECONOMIC SECURITY IN PAKISTAN: INDICATORS, ISSUES, IMPACTS AND WAY FORWARD." Pakistan Journal of Social Research 04, no. 01 (2022): 990–99. http://dx.doi.org/10.52567/pjsr.v4i1.1268.
Full textPeng, Xu, Susilo Willy, Wang Wei, et al. "ROSE: Robust Searchable Encryption with Forward and Backward Security." IEEE Transactions on Information Forensics and Security 17 (March 2, 2022): 1115–30. https://doi.org/10.1109/TIFS.2022.3155977.
Full textLi, Zhijie. "Research on Security Protection Technology of Digital Library System in the Era of Equal Protection 2.0." Journal of Physics: Conference Series 2025, no. 1 (2021): 012082. http://dx.doi.org/10.1088/1742-6596/2025/1/012082.
Full textKo, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (2021): 2057. http://dx.doi.org/10.3390/s21062057.
Full textGosavi, Mr Abhijeet, Mr Sakib Shaikh, Mr Adnan Sayyed, Mr Somesh Sapa, Mr Ayan Shaikh, and Prof A. A. Pund. "Enabling Encrypted Cloud Emails with Data Encryption using Advanced Encryption Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 864–69. http://dx.doi.org/10.22214/ijraset.2023.53709.
Full textZhu, You Chan, Peng Liu, and Jun Ting Wang. "Cloud Security Research in Cloud Computing." Applied Mechanics and Materials 198-199 (September 2012): 415–19. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.415.
Full textKumar, Praduman. "Food and nutrition security in India: The way forward." Agricultural Economics Research Review 30, no. 1 (2017): 1. http://dx.doi.org/10.5958/0974-0279.2017.00001.5.
Full textKumarChande, Manoj, and Balwant Singh Thakur. "An Improved Proxy Blind Signature Scheme with Forward Security." International Journal of Computer Applications 85, no. 15 (2014): 1–4. http://dx.doi.org/10.5120/14914-3321.
Full textParida, Arpita. "Security against Selective Forward Attack in Wireless Sensor Network." IOSR Journal of Engineering 02, no. 05 (2012): 1200–1206. http://dx.doi.org/10.9790/3021-020512001206.
Full textLi, Yuan, Xing-Chen Wang, Lin Huang, and Yun-Lei Zhao. "Order-Revealing Encryption: File-Injection Attack and Forward Security." Journal of Computer Science and Technology 36, no. 4 (2021): 877–95. http://dx.doi.org/10.1007/s11390-020-0060-y.
Full textShostack, Adam, Fabio Massacci, Eric Bodden, and Antonino Sabetta. "25 Years in Application Security: Looking Back, Looking Forward." IEEE Security & Privacy 20, no. 1 (2022): 109–12. http://dx.doi.org/10.1109/msec.2021.3127961.
Full textXu, Peng, Willy Susilo, Wei Wang, et al. "ROSE: Robust Searchable Encryption With Forward and Backward Security." IEEE Transactions on Information Forensics and Security 17 (2022): 1115–30. http://dx.doi.org/10.1109/tifs.2022.3155977.
Full textHentz, James J., Fredrik Söderbaum, and Rodrigo Tavares. "Regional Organizations and African Security: Moving the Debate Forward." African Security 2, no. 2-3 (2009): 206–17. http://dx.doi.org/10.1080/19362200903362109.
Full textStrawa, Anthony W., Gary Latshaw, Stanley Farkas, Philip Russell, and Steven Zornetzer. "Arctic Ice Loss Threatens National Security: A Path Forward." Orbis 64, no. 4 (2020): 622–36. http://dx.doi.org/10.1016/j.orbis.2020.08.010.
Full textSteinwandt, Rainer, and Adriana Suárez Corona. "Identity-based non-interactive key distribution with forward security." Designs, Codes and Cryptography 64, no. 1-2 (2011): 195–208. http://dx.doi.org/10.1007/s10623-011-9486-0.
Full textYu, Jia, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, and Yangkui Chen. "Forward-secure identity-based signature: Security notions and construction." Information Sciences 181, no. 3 (2011): 648–60. http://dx.doi.org/10.1016/j.ins.2010.09.034.
Full textMens, Jay. "Iran’s “Forward Defense,” Israel’s Security Dilemma, and American Strategy." Orbis 68, no. 3 (2024): 438–61. http://dx.doi.org/10.1016/j.orbis.2024.05.010.
Full textLi, Fengyin, Junhui Wang, and Zhihao Song. "Privacy Protection of Cloud Computing Based on Strong Forward Security." International Journal of Cloud Applications and Computing 13, no. 1 (2023): 1–9. http://dx.doi.org/10.4018/ijcac.323804.
Full textMamajonov, U.O, and B.A Abdunazarov. "ORGANIZATION OF INFORMATION SECURITY MECHANISM FOR VIRTUALIZATION ENVIRONMENT." International Journal of Education, Social Science & Humanities. FARS Publishers 11, no. 3 (2023): 51–57. https://doi.org/10.5281/zenodo.7699431.
Full textWu, Yan Yan. "E-Commerce Security Based on a Security Engineering Life Cycle." Advanced Materials Research 171-172 (December 2010): 640–43. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.640.
Full textPeterson, Christopher, and Valerie Watzlaf. "Telerehabilitation Store and Forward Applications: A Review of Applications and Privacy Considerations in Physical and Occupational Therapy Practice." International Journal of Telerehabilitation 6, no. 2 (2015): 75–84. http://dx.doi.org/10.5195/ijt.2014.6161.
Full textSumeet, Gill, and Devi Renu. "Enhancing Cloud Data Security using Artificial Neural Networks for Users' Account Hijacking Security Threats." Indian Journal of Science and Technology 17, no. 34 (2024): 3538–52. https://doi.org/10.17485/IJST/v17i34.2339.
Full textAlnashwan, Rabiah, Prosanta Gope, Benjamin Dowling, and Yang Yang. "PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols." Proceedings on Privacy Enhancing Technologies 2025, no. 2 (2025): 450–78. https://doi.org/10.56553/popets-2025-0071.
Full text