-
2221
Market Structure and Competition During Economic Transformation
Published 2022-11-01“…In addition to digitization and climate change, a possible deglobalization is also being discussed in the wake of the COVID 19 pandemic and Russia’s attack on Ukraine. In particular, the disruptions and uncertainties recently observed in international value chains provide an incentive for companies to rethink and restructure supply chains. …”
Get full text
Article -
2222
Quantum Key Relay Scheme Based on Trusted Control Center
Published 2014-06-01“…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
Get full text
Article -
2223
Quelle éducation morale et civique à l’école ? Pourquoi et comment la mettre en œuvre ?
Published 2017-12-01“…This education serves as a "pedagogical lever" to improve the "living together" threatened by these crises, and most recently by terrorist attacks claimed by a fundamentalist Islamism. The recommendations of the European Union to its member states underline the importance of relational, intercultural and empathic competences as facilitating elements to live together. …”
Get full text
Article -
2224
L’Arlequinade anglaise et la gravure satirique au XVIIIe siècle : Élaboration esthétique et détournement politique
Published 2003-01-01“…In the satirical texts of the 1720s, the English pantomime and its emblematic figure, Harlequin, pandered to the xenophobic prejudices that stigmatised foreignness and at the same time fuelled the attacks of literary satirists who exposed the degeneracy of the national stage. …”
Get full text
Article -
2225
Dissections in Phoebe Gloeckner’s A Child’s Life (1998, 2000)
Published 2020-05-01“…Phoebe Gloeckner’s anatomical drawings and écorchés, her often blunt and jarring graphic narratives centered on abusive relations, are inevitably controversial; they fly in the face of feminist attacks on such representations as debasing to women and they complexify and redirect the debate about child sexuality. …”
Get full text
Article -
2226
Secure key-sharing algorithm based on smart grid
Published 2021-08-01“…Most of establishment-key protocols suffer from both session-specific temporary information attack and private key leakage issue.Therefore, a novel public key sharing-based symmetric encryption algorithm (PKS-SE) was proposed, in order to maintain the security of communication between smart meter and service providers.Based on bilinear mapping and super-singular curve, PKS-SE algorithm constructed the communication key between intelligent electricity meter and service provider, in order to avoid the key escrow problem.At the same time, PKS-SE algorithm reduced the number of required messages during the mutual authentication to only two messages, thus controlling the communication cost and operation cost of PKS-SE algorithm.Simulation results show that the proposed PKS-SE algorithm can effectively realize public key-sharing…”
Get full text
Article -
2227
Preparing to Evacuate your Home in Case of an Emergency
Published 2003-07-01“… During these times of potential terrorist attacks, it is important to plan for the worst and hope that it never happens. …”
Get full text
Article -
2228
Citrus peelminer Marmara gulosa Guillèn and Davis (Insecta: Lepidoptera: Gracillariidae)
Published 2013-04-01“…This moth is considered native in the United States, attacking willow. It is believed that a host-shift occurred to multiple non-native plants including all varieties of citrus and certain ornamentals, such as oleander. …”
Get full text
Article -
2229
Mauritanie 1956-1963 : les multiples dimensions d’une indépendance contestée
Published 2018-06-01“…This contribution looks to improve our knowledge of the tense atmosphere that prevails in this country, target of several attacks between 1956 and 1963, and subject to an imposing military mobilization along its borders with the Spanish Sahara and Algeria at war. …”
Get full text
Article -
2230
Android malware detection method based on deep neural network
Published 2020-10-01“…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
Get full text
Article -
2231
La réponse sécuritaire de l’administration Bush : l’USA PATRIOT Act et les libertés individuelles
Published 2011-09-01“…One of the key actions taken by the Bush administration was to push for the adoption of the USA PATRIOT Actin order to address the needs of a country following an unprecedented terrorist attack. While most aspects of the legislation are not controversial, a few sections giving the government greater surveillance powers raise civil liberties issues. …”
Get full text
Article -
2232
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
Published 2021-11-01“…It is necessary to use digital signature scheme to protect integrity and authentication of commands sent by command agencies to unmanned aerial vehicle (UAV) in the UAV networks.Moreover, the signature scheme should ensure UAV can receive signature in time and protect privacy of signers.Therefore, an attribute-based proxy signature scheme for UAV networks was proposed and its security was analyzed.The proposed signature scheme has existential unforgeability under selective-attribute and chosen message attacks, and privacy of signers is protected.Its efficiency was analyzed in terms of computation costs and communication costs, and compared with other related signature schemes.The results indicate the proposed signature scheme has less computation costs when its communication costs are at the same level with other signature schemes.…”
Get full text
Article -
2233
La FIJL dans la lutte antifranquiste (1960-1974)
Published 2024-09-01“…Between 1962 and 1963, young libertarians participated in attacks affecting Spain and Europe, which mainly targeted international tourism and the Franco regime. …”
Get full text
Article -
2234
Joint amplitude and phase partition based physical layer key generation method
Published 2021-05-01“…A key generation method based on wireless channel physical layer features is of great significance for improving security of wireless transmission.An orthogonal frequency division multiplexing (OFDM) communication system based on time division duplex (TDD) with multipath fading channels was considered.Utilizing the advantages of OFDM multicarrier and the channel reciprocity and combining the phase and amplitude information of channel frequency response (CFR), two algorithms for physical layer key generation were proposed.Theoretical analysis and experimental simulation show that the proposed algorithm has more consistent and smaller overhead in information negotiation, in addition, the proposed algorithm can increase the key length and enhance randomness, and has a better defense capability against eavesdropping and active attacks of the illegal user.…”
Get full text
Article -
2235
Disaster Planning: Important Papers and Documents
Published 2003-06-01“…Whether the disaster is a hurricane, tornado or a terrorist attack preparation is the key to survival and to clean up after the event. …”
Get full text
Article -
2236
DGA malicious domain name identification based on XGBoost and particle swarm optimization algorithm
Published 2024-11-01“…Domain generation algorithms (DGA) have become a common method of network attacks. To enhance the detection capability for DGA malicious domains, a method for malicious domain identification based on XGBoost and particle swarm optimization (PSO) algorithms was proposed. …”
Get full text
Article -
2237
The prevalence of women sexual locking in a gender violence context - a pastoral perspective
Published 2016-12-01“…Many taboos and rituals were put in place to ensure that marriage endures for as long as the couple lives. Any attack on marriage was rendered as a great enemy that deserved to be arrested and destroyed. …”
Get full text
Article -
2238
Le concept de « Britishness » dans les emblèmes de Henry Peacham (1612) : vers une reconquête identitaire ?
Published 2015-07-01“…Finally, Peacham’s emblems aim to reestablish a number of historical landmarks in order to eradicate all possible recalcitrance, particularly from those attacking the Union project.…”
Get full text
Article -
2239
Stink Bugs in Florida Rice
Published 2013-12-01“…The stink bug complex attacking Florida rice is the most diversified and unique stink bug complex in US rice production. …”
Get full text
Article -
2240
Security sharing scheme for encrypted data in cloud storage
Published 2015-10-01“…With the convenient of storing and sharing data in cloud storage environment,the concerns about data security arised as well.To achieve data security on untrusted servers,user usually stored the encrypted data on the cloud storage environment.How to build a cipertext-based access control scheme became a pot issue.For the access control problems of ciphertext in cloud storage environment,a CP-ABE based data sharing scheme was proposed.Novel key generation and distribution strategies were proposed to reduce the reliance on a trusted third party.Personal information was added in decryption key to resistant conclusion attacks at the same time.Moreover,key revocation scheme was proposed to provide the data backward secrecy.The security and implement analysis proves that proposed scheme is suit for the real application environment.…”
Get full text
Article