Results 21 to 30 of about 617,080 (246)
Transparent end-user authentication across heterogeneous wireless networks [PDF]
With the increasing number of mobile and wireless networks that are deployed, the handovers between these systems take place more often. In order to provide end-users with uninterrupted access to services, support for fast handover is essential.
Chen, Hong +2 more
core +2 more sources
Intelligent Data Management and Security in Cloud Computing
This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the
Lidia Ogiela, Marek R. Ogiela, Hoon Ko
doaj +1 more source
The Russian Empire, with centuries-old imperial traditions, was based on military force, in which a significant role was played by the accumulation of information about opponents and the fight against foreign espionage inside the country.
Artur LEȘCU
doaj +1 more source
Controlul exercitat de serviciile secrete din România asupra politicii și presei – metatemă a alegerilor prezidențiale din 2014 (The Control of the Secret Services Over Politics and Media – Metatheme of the Presidential Election in 2014) [PDF]
The last Romanian presidential elections have been marked – more than in any other post-communist electoral races – by the public debate regarding the control of the secret services over politics and media.
Luminița KOHALMI
doaj
Confidential information or trade secrets of a company is very important for business actors, since the development of information-based business. Information has economic values and concerns the quality of the goods and services produced.
Herdy Ryzkyta Ferdiana +2 more
doaj +1 more source
La guerra del comandante Troncoso. Terrorismo y espionaje en Francia durante la Guerra Civil Española [PDF]
In this article we will try to analyze the activities developed by the Francoist espionage services operating in France during the Spanish Civil War, using the figure of Commander Troncoso as a guideline.
Pedro Barruso Barés
doaj
A threshold secure data sharing scheme for federated clouds
Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost.
Padmavathamma, M., Venkataramana, K.
core +1 more source
Russia's secret services at war [PDF]
This repository item contains a single issue of Behind the Breaking News, a briefing published from 1999 to 2009 by the Boston University Institute for the Study of Conflict, Ideology, and ...
Adami, Fabian
core +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Zainteresowanie CIA krajami postradzieckimi z perspektywy zasobów globalnego Internetu [PDF]
The activities of the secret services are a difficult subject of research due to the secrecy of information. However, there is an indirect way to obtain data on the activities of the secret services, namely through white intelligence (OSINT).
Jan A. Wendt
doaj

