Results 41 to 50 of about 13,481,561 (335)

Political-military alliances in shaping the security of Poland in 1918-1939 [PDF]

open access: yesScientific Journal of the Military University of Land Forces, 2020
Poland was forming allied relations in the twenties and thirties of the twentieth century due to the state’s weakness, mainly in military and economic terms. The Polish state’s situation regarding political and military security guarantees on the part of
Zdzisław Cutter
doaj   +1 more source

Military and Technical Cooperation of Russia in System of National Security of the Country

open access: yesУправленческое консультирование, 2018
In the article, the role of the military and technical cooperation (MTC) of Russia with the foreign states in ensuring national security of the country is considered.
Igor Mikhailovich Levkin   +1 more
doaj   +1 more source

Uncertainty Evaluation of Uranium Content Measurements by Redox Potential Titration Methods

open access: yesHe huaxue yu fangshe huaxue, 2023
Uranium content measurement is very important to nuclear material accounting and product quality control in nuclear bulk facilities. It needs high accuracy and precision.
TIAN Chuan   +10 more
doaj   +1 more source

Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review

open access: yesIEEE Access, 2022
With the rapid enhancement in the design and development of the Internet of Things creates a new research interest in the adaptation in industrial domains.
A. Khan   +4 more
semanticscholar   +1 more source

A Hybrid Analysis for Security Protocols with State [PDF]

open access: yes, 2014
Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session.
Dougherty, Daniel J.   +3 more
core   +3 more sources

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

The State of Food Security and Nutrition in the World 2020

open access: yes, 2020
Five years into the 2030 Agenda, it is time to assess progress and to question whether continuing efforts implemented thus far will allow countries to reach SDG 2 targets.
D. Missing
semanticscholar   +1 more source

Measuring Entangled Qutrits and Their Use for Quantum Bit Commitment [PDF]

open access: yes, 2004
We produce and holographically measure entangled qudits encoded in transverse spatial modes of single photons. With the novel use of a quantum state tomography method that only requires two-state superpositions, we achieve the most complete ...
Bartlett, Stephen D.   +7 more
core   +2 more sources

Personalizing the Pediatric Hematology/Oncology Fellowship: Adapting Training for the Next Generation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein   +3 more
wiley   +1 more source

Decoy State Quantum Key Distribution With Modified Coherent State

open access: yes, 2007
To beat PNS attack, decoy state quantum key distribution (QKD) based on coherent state has been studied widely. We present a decoy state QKD protocol with modified coherent state (MCS).
C. H. Bennett   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy