Results 311 to 320 of about 14,354,866 (342)
Some of the next articles are maybe not open access.

The Theory of Planned Behavior and Information Security Policy Compliance

Journal of Computational Information Systems, 2019
Teodor Sommestad   +2 more
semanticscholar   +1 more source

Circularly polarized lanthanide luminescence for advanced security inks

Nature Reviews Chemistry, 2020
Lewis Edward MacKenzie, Robert Pal
exaly  

Cybersecurity and information security - what goes where?

Information and Computer Security, 2018
S. V. Solms, R. V. Solms
semanticscholar   +1 more source

Nano-enabled pesticides for sustainable agriculture and global food security

Nature Nanotechnology, 2022
Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly  

A Survey on Security Aspects for 3GPP 5G Networks

IEEE Communications Surveys and Tutorials, 2020
Jin Cao, Hui Li, Ruhui
exaly  

The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence

Information Systems Frontiers, 2019
Eun-Ha Kweon   +3 more
semanticscholar   +1 more source

The security of practical quantum key distribution

Reviews of Modern Physics, 2009
Valerio Scarani   +2 more
exaly  

Security Services Using Blockchains: A State of the Art Survey

IEEE Communications Surveys and Tutorials, 2019
Tara Salman   +2 more
exaly  

Home - About - Disclaimer - Privacy