Search query: security
Categories: All Categories
13142 records searched, 334 records found, 20 matches displayed
< Previous 20 articles Next 20 articles >
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Using forest resources strengthens food security (via sciencedaily.com) Original source
Forests can reduce hunger in rural households while also capturing carbon and advancing sustainabili...
Published Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature (via sciencedaily.com) Original source
Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter ...
Published Securing supply chains with quantum computing - Securing Supply Chains with Quantum Computing (via sciencedaily.com)
New research in quantum computing is moving science closer to being able to overcome supply-chain ch...
Published Identifying research priorities for security and safety threats in the Arctic and the North-Atlantic - Identifying Research Priorities for Security and Safety Threats in the Arctic and the North-Atlantic (via sciencedaily.com)
A new method has been developed for identifying and prioritizing research activities related to mari...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data (via sciencedaily.com)
Researchers have shown that a component of modern computer processors that enables different areas o...
Published IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light (via sciencedaily.com)
Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...
Published Nature-based solutions can help tackle climate change and food security, but communities outside Europe are missing out (via sciencedaily.com) Original source
Nature-based solutions (NBS) can help grand challenges, such as climate change and food security, bu ...
Published Keep it secret: Cloud data storage security approach taps quantum physics (via sciencedaily.com) Original source
Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum ...
Published Randomness theory could hold key to internet security - Randomness Theory Could Hold Key to Internet Security (via sciencedaily.com)
Researchers identified a problem that holds the key to whether all encryption can be broken -- as we...
Published Real-world study shows the potential of gait authentication to enhance smartphone security - Real-World Study Shows the Potential of Gait Authentication to Enhance Smartphone Security (via sciencedaily.com)
A study showed that -- within an appropriate framework -- gait recognition could be a viable techniq...
Published New breakthrough enables perfectly secure digital communications - New Breakthrough Enables Perfectly Secure Digital Communications (via sciencedaily.com)
Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the ...
Published New technique offers faster security for non-volatile memory tech - New Technique Offers Faster Security for Non-Volatile Memory Tech (via sciencedaily.com)
Researchers have developed a technique that leverages hardware and software to improve file system s...
Published AI should be better understood and managed -- new research warns (via sciencedaily.com) Original source
Artificial Intelligence (AI) and algorithms can and are being used to radicalize, polarize, and spre...
Published Potassium depletion in soil threatens global crop yields (via sciencedaily.com) Original source
Potassium deficiency in agricultural soils is a largely unrecognized but potentially significant thr...
Published Improving energy security with policies focused on demand-side solutions (via sciencedaily.com) Original source
Energy systems essential to supporting our everyday activities face increasing threats from wars, pa...
Published Securing competitiveness of energy-intensive industries through relocation: The pulling power of renewables (via sciencedaily.com) Original source
Countries with limited potential for renewables could save up to 20 percent of costs for green steel...
Published There is mathematical proof in the pudding (via sciencedaily.com) Original source
In blockchain development, there is a rule of thumb that only two of scalability, security, and dece ...
Published Ways to tackle water security challenges in world's drylands - Ways to Tackle Water Security Challenges in World's Drylands (via sciencedaily.com)
To counter the effects of climate change on drylands, a new study suggests that global access to wat...
Published Chromo-encryption method encodes secrets with color - Chromo-encryption method encodes secrets with color (via sciencedaily.com)
In a new approach to security that unites technology and art, E researchers have combined silver nan ...
Published Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication (via sciencedaily.com)
The world is one step closer to having a totally secure internet and an answer to the growing threat ...