Results 61 to 70 of about 3,117,544 (197)
Mobile integrated conditional access system [PDF]
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N +4 more
core +1 more source
Directions for Improving Administrative Legislation in the Sphere of State Security
The article is devoted to the analysis of the problems of applying the norms of the Code of Ukraine on Administrative Offenses in the sphere of state security under martial law.
S. F. Konstantinov
doaj +1 more source
Improving Food Security in Africa: Highlights of 25 Years of Research, Capacity-Building, and Outreach. [PDF]
Decades of research have led to substantially improved understanding of the nature of food insecurity. A combination of economic growth and targeted programs resulted in a steady fall (until the food crisis of 2007/08) in the percentage of the world’s ...
Food Security Group at Michigan State University
core +1 more source
Local authorities of the Privislinsky territory in the fight against the revolution of 1905–1907 [PDF]
The article examines the activities of local authorities of the Privislinsky Territory of the Russian Empire during the First Russian Revolution of 1905–1907 to ensure state and security. An analysis of the activities of the regional administration
Ananyev, Sergey Valeryevich
doaj +1 more source
What Factors Account for State-to-State Differences in Food Security? [PDF]
States differ in the extent to which their residents are food secure—meaning that they have consistent access to enough food for active, healthy living.
Bartfeld, Judi +3 more
core +1 more source
Going Rogue: Mobile Research Applications and the Right to Privacy [PDF]
This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced.
Tovino, Stacey A.
core +2 more sources
The present paper aims to analyse the historical and political contexts in which the Bulgarian translations of Qurʾān were created and disseminated. The history of Bulgarian translations of Qurʾān may be divided into three periods: 1900–1944, 1944–1989 ...
Pavel Pavlovitch
doaj +1 more source
State of Alaska Election Security Project Phase 2 Report [PDF]
A laska’s election system is among the most secure in the country, and it has a number of safeguards other states are now adopting. But the technology Alaska uses to record and count votes could be improved— and the state’s huge size, limited road ...
Ayers, Mark +4 more
core
NATIONAL SECURITY AND STATE SECURITY (REMINISCENCES)
State security and homeland security are concepts that frequently appear in academic studies and are permanently enshrined in law. They are sometimes even treated as synonyms, despite sharing only a single element, that of security. Are they really identical concepts? Do they have relations indicating interpretative differences?
openaire +1 more source
Space as a New Category of Threats to National Security
The scientific considerations presented in this paper concern threats to national security arising from the activity in outer space. The objective of this analysis is to identify these dangers and to propose solutions to minimize them.
Radosław BIELAWSKI
doaj +1 more source

