Results 31 to 40 of about 3,894,133 (310)

TRENDS IN FINANCIAL SECURITY RESEARCH: A BIBLIOMETRIC ANALYSIS

open access: yesFinancial and credit activity problems of theory and practice, 2023
Achieving financial security becomes one of the main tasks of the government, business management, investors and citizens. However, at the same time, the very comprehension of the essence of such security is ambiguous, as well as the mechanism for ...
H. Yaremko   +4 more
semanticscholar   +1 more source

Efficient Implementation of NIST LWC ESTATE Algorithm Using OpenCL and Web Assembly for Secure Communication in Edge Computing Environment

open access: yesSensors, 2021
In edge computing service, edge devices collect data from a number of embedded devices, like sensors, CCTVs (Closed-circuit Television), and so on, and communicate with application servers.
BoSun Park, Seog Chung Seo
doaj   +1 more source

Financial security of the banking system of Ukraine

open access: yesGalic'kij ekonomičnij visnik, 2023
This study examines approaches to understanding the essence of the financial security of the state's banking system, which is one of the key components of the economic system.
Natalia Blaschuk-Devyatkina   +1 more
semanticscholar   +1 more source

Highly Efficient Implementation of Block Ciphers on Graphic Processing Units for Massively Large Data

open access: yesApplied Sciences, 2020
With the advent of IoT and Cloud computing service technology, the size of user data to be managed and file data to be transmitted has been significantly increased.
SangWoo An, Seog Chung Seo
doaj   +1 more source

Swarm Intelligence Algorithms in Text Document Clustering with Various Benchmarks

open access: yesSensors, 2021
Text document clustering refers to the unsupervised classification of textual documents into clusters based on content similarity and can be applied in applications such as search optimization and extracting hidden information from data generated by IoT ...
Suganya Selvaraj, Eunmi Choi
doaj   +1 more source

Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic

open access: yesEnergies, 2022
Today, one of the main priorities in Europe is to introduce measures to increase environmental protection. Therefore, SMEs operating in the branch related to renewable energy are essential for several EU priorities.
G. Zimon   +3 more
semanticscholar   +1 more source

Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU

open access: yesIEEE Access, 2022
Data encryption is essential for securely managing clients’ data in servers in data-centric ICT environment. Clients must encrypt the data before transmitting it to severs or other clients. Encrypting a large volumne of data requires a lot of time.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption

open access: yesIEEE Access, 2022
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size.
Sangwoo An, Seog Chung Seo
doaj   +1 more source

Measuring Social Security's Financial Problems [PDF]

open access: yesSSRN Electronic Journal, 2005
The U.S. Social Security system has helped keep many retirees out of poverty. However, according to the Social Security and Medicare Trustees, Social Security faces a future financial shortfall of $10.4 trillion in present value. This enormous imbalance has received little attention in public debates about Social Security.
Jagadeesh Gokhale, Kent Smetters
openaire   +2 more sources

REGULATORY AND LEGAL COMPONENT IN ENSURING STATE’S FINANCIAL SECURITY

open access: yesBusiness: Theory and Practice, 2021
The purpose of the study is to scientifically substantiate the place and role of regulatory support in the formation of financial security, study the factors influencing its level and identify ways to improve it.
N. Rushchyshyn   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy