Results 241 to 250 of about 5,288,295 (302)
BAAR: A framework for blockchain-based anonymous and revocable user authentication scheme. [PDF]
Ahmed M, Ahmad A, Zeshan F, Akram S.
europepmc +1 more source
Hacking continuous-variable quantum key distribution using the photorefractive effect on proton-exchanged/annealed-proton-exchanged waveguide. [PDF]
Mao N +5 more
europepmc +1 more source
Parents' experiences with the Circle of Security Parenting (COSP) intervention - a scoping review of qualitative studies. [PDF]
Øen KG +3 more
europepmc +1 more source
Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models. [PDF]
Qasem MA +5 more
europepmc +1 more source
Correction to: Governing health through security in the Philippines: a realist analysis. [PDF]
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security? What security? [job security]
Engineering & Technology, 2009The paper discusses about job security. The article looks at two staples of insecurity. First, working for two superiors, both of which are demanding to prioritise their work, and second the budget slashing of the company. Case studies in a generalised situation are also presented. The information and advice given here conforms to what is believe to be
openaire +1 more source
Southeast European and Black Sea Studies, 2003
(2003). Balkan security: What security? Whose security? Southeast European and Black Sea Studies: Vol. 3, No. 3, pp. 105-129.
openaire +1 more source
(2003). Balkan security: What security? Whose security? Southeast European and Black Sea Studies: Vol. 3, No. 3, pp. 105-129.
openaire +1 more source
City, 2014
During the industrial era, the world's largest private security firm was the Pinkerton National Detective Agency.
openaire +1 more source
During the industrial era, the world's largest private security firm was the Pinkerton National Detective Agency.
openaire +1 more source

