Packet Key-Based End-to-End Security Management on a Blockchain Control Plane. [PDF]
The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing ...
Jung Y, Peradilla M, Agulto R.
europepmc +2 more sources
CHALLENGES OF IMPLEMENTATION OF STATE SECURITY SERVICES [PDF]
In the process of managing the country, it is advisable to look at broader measures of public administration in the implementation of specific national security services implemented to ensure existential and behavioral needs of society.
Marek Zbigniew KULISZ
doaj +9 more sources
The aim of the paper is to conduct an analysis of various threats that may occur during road freight transport in the territory of the European Union. The research method consisted of a survey and the sample group selected for the survey were transport ...
Marek Krzywonos
doaj +10 more sources
Assessment of the level of financial and economic security at machine-building enterprises: evidence from Ukraine [PDF]
Determining the level of financial and economic security of an enterprise allows assessing the real possibilities to confront internal and external challenges and defining the potential for future development. To develop proposals on assessing this level,
Alla Cherep +3 more
doaj +1 more source
QUALITY CRITERIA FOR THE PRIVATE SECURITY COMPANIES AND CHALLENGES FOR THEIR IMPLEMENTATION IN CONTEMPORARY ENVIRONMENT [PDF]
In the past decades it is evident that the modern mega trends: globalization, urbanization, digitalization etc., and the new forms of security risks and threats had influenced and moderated the organization of state security.
Sanja Kermetchieva +1 more
doaj +1 more source
Smart security management in secure devices [PDF]
Among other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one.
Robisson, Bruno +6 more
openaire +4 more sources
The existence of security threats and internet abuse is often a problem for companies. Use of a VPN for access to web pages that contain negative and pornographic content which usually contain malware, viruses, trojans and others.
Sidik Sidik +3 more
doaj +1 more source
European Security Management at the National Level. A Comparative Analysis of Strategies for the Development of Defence Capability in the United Kingdom and Poland [PDF]
The article presents the positions of the UK and Polish governments on the importance of European security management as a factor influencing and shaping the defence doctrine in both states.
Joanna Iwancz, Bartlomiej H. Toszek
doaj +1 more source
The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj +1 more source
Legal interpretation of modern security risks [PDF]
With globalization, we have a pronounced paradigm of a risky society. That paradigm arises due to the uncontrolled production of socioeconomic, environmental and military risks.
Bardžić Žikica +1 more
doaj

