Results 21 to 30 of about 617,080 (246)

Transparent end-user authentication across heterogeneous wireless networks [PDF]

open access: yes, 2003
With the increasing number of mobile and wireless networks that are deployed, the handovers between these systems take place more often. In order to provide end-users with uninterrupted access to services, support for fast handover is essential.
Chen, Hong   +2 more
core   +2 more sources

Intelligent Data Management and Security in Cloud Computing

open access: yesSensors, 2020
This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the
Lidia Ogiela, Marek R. Ogiela, Hoon Ko
doaj   +1 more source

Military counterespionage against Romania executed by the directorate of the independent gendarme corps from Bessarabia

open access: yesBulletin of "Carol I" National Defense University
The Russian Empire, with centuries-old imperial traditions, was based on military force, in which a significant role was played by the accumulation of information about opponents and the fight against foreign espionage inside the country.
Artur LEȘCU
doaj   +1 more source

Controlul exercitat de serviciile secrete din România asupra politicii și presei – metatemă a alegerilor prezidențiale din 2014 (The Control of the Secret Services Over Politics and Media – Metatheme of the Presidential Election in 2014) [PDF]

open access: yesPolis: Revista de Stiinte Politice, 2015
The last Romanian presidential elections have been marked – more than in any other post-communist electoral races – by the public debate regarding the control of the secret services over politics and media.
Luminița KOHALMI
doaj  

URGENSI AKTA NOTARIS DALAM PERJANJIAN PENGALIHAN LISENSI RAHASIA DAGANG SEBAGAI UPAYA MEMBERIKAN KEPASTIAN HUKUM PARA PIHAK

open access: yesJurnal Litigasi, 2021
  Confidential information or trade secrets of a company is very important for business actors, since the development of information-based business. Information has economic values and concerns the quality of the goods and services produced.
Herdy Ryzkyta Ferdiana   +2 more
doaj   +1 more source

La guerra del comandante Troncoso. Terrorismo y espionaje en Francia durante la Guerra Civil Española [PDF]

open access: yesDiacronie. Studi di Storia Contemporanea, 2016
In this article we will try to analyze the activities developed by the Francoist espionage services operating in France during the Spanish Civil War, using the figure of Commander Troncoso as a guideline.
Pedro Barruso Barés
doaj  

A threshold secure data sharing scheme for federated clouds

open access: yes, 2012
Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost.
Padmavathamma, M., Venkataramana, K.
core   +1 more source

Russia's secret services at war [PDF]

open access: yes, 2006
This repository item contains a single issue of Behind the Breaking News, a briefing published from 1999 to 2009 by the Boston University Institute for the Study of Conflict, Ideology, and ...
Adami, Fabian
core   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Zainteresowanie CIA krajami postradzieckimi z perspektywy zasobów globalnego Internetu [PDF]

open access: yesPrzegląd Geopolityczny, 2022
The activities of the secret services are a difficult subject of research due to the secrecy of information. However, there is an indirect way to obtain data on the activities of the secret services, namely through white intelligence (OSINT).
Jan A. Wendt
doaj  

Home - About - Disclaimer - Privacy