Search query: security
Categories: All Categories
13142 records searched, 334 records found, 20 matches displayed
< Previous 20 articles Next 20 articles >
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Using forest resources strengthens food security



Forests can reduce hunger in rural households while also capturing carbon and advancing sustainabili...
Published Researchers unveil Internet of Things security feature - Researchers Unveil Internet of Things Security Feature



Integrated circuit designers have developed a new approach for creating secure keys and IDs on Inter ...
Published Securing supply chains with quantum computing - Securing Supply Chains with Quantum Computing


New research in quantum computing is moving science closer to being able to overcome supply-chain ch...
Published Identifying research priorities for security and safety threats in the Arctic and the North-Atlantic - Identifying Research Priorities for Security and Safety Threats in the Arctic and the North-Atlantic


A new method has been developed for identifying and prioritizing research activities related to mari...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data


Researchers have shown that a component of modern computer processors that enables different areas o...
Published IT security: Computer attacks with laser light - IT Security: Protecting Against Computer Attacks with Laser Light


Computer systems that are physically isolated from the outside world (air-gapped) can still be attac...
Published Nature-based solutions can help tackle climate change and food security, but communities outside Europe are missing out



Nature-based solutions (NBS) can help grand challenges, such as climate change and food security, bu ...
Published Keep it secret: Cloud data storage security approach taps quantum physics



Distributed cloud storage is a hot topic for security researchers, and a team is now merging quantum ...
Published Randomness theory could hold key to internet security - Randomness Theory Could Hold Key to Internet Security


Researchers identified a problem that holds the key to whether all encryption can be broken -- as we...
Published Real-world study shows the potential of gait authentication to enhance smartphone security - Real-World Study Shows the Potential of Gait Authentication to Enhance Smartphone Security


A study showed that -- within an appropriate framework -- gait recognition could be a viable techniq...
Published New breakthrough enables perfectly secure digital communications - New Breakthrough Enables Perfectly Secure Digital Communications


Researchers have achieved a breakthrough to enable 'perfectly secure' hidden communications for the ...
Published New technique offers faster security for non-volatile memory tech - New Technique Offers Faster Security for Non-Volatile Memory Tech


Researchers have developed a technique that leverages hardware and software to improve file system s...
Published AI should be better understood and managed -- new research warns



Artificial Intelligence (AI) and algorithms can and are being used to radicalize, polarize, and spre...
Published Potassium depletion in soil threatens global crop yields



Potassium deficiency in agricultural soils is a largely unrecognized but potentially significant thr...
Published Improving energy security with policies focused on demand-side solutions



Energy systems essential to supporting our everyday activities face increasing threats from wars, pa...
Published Securing competitiveness of energy-intensive industries through relocation: The pulling power of renewables



Countries with limited potential for renewables could save up to 20 percent of costs for green steel...
Published There is mathematical proof in the pudding



In blockchain development, there is a rule of thumb that only two of scalability, security, and dece ...
Published Ways to tackle water security challenges in world's drylands - Ways to Tackle Water Security Challenges in World's Drylands


To counter the effects of climate change on drylands, a new study suggests that global access to wat...
Published Chromo-encryption method encodes secrets with color - Chromo-encryption method encodes secrets with color


In a new approach to security that unites technology and art, E researchers have combined silver nan ...
Published Revolutionary quantum breakthrough paves way for safer online communication - Revolutionary Quantum Breakthrough Paves Way for Safer Online Communication


The world is one step closer to having a totally secure internet and an answer to the growing threat ...