Results 311 to 320 of about 14,354,866 (342)
Some of the next articles are maybe not open access.
The Theory of Planned Behavior and Information Security Policy Compliance
Journal of Computational Information Systems, 2019Teodor Sommestad +2 more
semanticscholar +1 more source
Information security breaches and IT security investments: Impacts on competitors
Information Manager (The), 2019C. Jeong, S. Lee, Jee-Hae Lim
semanticscholar +1 more source
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
Cybersecurity and information security - what goes where?
Information and Computer Security, 2018S. V. Solms, R. V. Solms
semanticscholar +1 more source
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
A Survey on Security Aspects for 3GPP 5G Networks
IEEE Communications Surveys and Tutorials, 2020Jin Cao, Hui Li, Ruhui
exaly
The security of practical quantum key distribution
Reviews of Modern Physics, 2009Valerio Scarani +2 more
exaly
Security Services Using Blockchains: A State of the Art Survey
IEEE Communications Surveys and Tutorials, 2019Tara Salman +2 more
exaly

