-
1641
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…Furthermore, the simulation results prove that this scheme can resist quantum attacks in the Internet of things.…”
Get full text
Article -
1642
Patent Foramen Ovale Closure for Treating Migraine: A Meta-Analysis
Published 2022-01-01“…Treatment with PFO closure could reduce the frequency of headaches and monthly migraine days and is an efficient treatment for migraine attacks with aura.…”
Get full text
Article -
1643
Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
Published 2015-01-01“…Security analysis and experimental results showed that the proposed scheme could protect data transmission between wireless sensor nodes from being attacked, and significantly reduced the communication overhead for the whole system compared to the existing ECC_AES scheme, thus satisfying the real-time data transmission requirement of ITS.…”
Get full text
Article -
1644
Theatrical Colours: Cosmetics, Rhetoric and Theatre in Webster’s The White Devil
Published 2015-06-01“…This change was marked by the development of painting techniques as well as by the attacks on cosmetics and the “false colouring” (Quintilianus 8, 3, 7) of rhetoric prevalent during this period. …”
Get full text
Article -
1645
Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability
Published 2014-01-01“…We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. …”
Get full text
Article -
1646
Steepest-Ascent Revisited: Unconstrained Missile Trajectory
Published 2014-01-01“…A Steepest-Ascent numerical procedure for offline trajectory optimization of a surface-to-surface missile attacking a stationary target is presented. A detailed numerical solution, starting from building the mathematical formulation till generating an offline angle of attack control history, is illustrated. …”
Get full text
Article -
1647
Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform
Published 2022-11-01“…A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
Get full text
Article -
1648
DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks
Published 2015-11-01“…In scenarios involving unprotected hostile outdoor areas, SSNs are prone to different types of attacks that can compromise reliability, integrity, and availability of the sensor data traffic and sensor lifetime as well. …”
Get full text
Article -
1649
Preoperative Inflammatory Control and Surgical Outcome of Vitrectomy in Intermediate Uveitis
Published 2017-01-01“…The numbers of uveitis attacks, local steroid injections, and systemic medications significantly decreased, and vision meaningfully improved after vitrectomy. …”
Get full text
Article -
1650
Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms
Published 2025-01-01“…By analyzing case studies such as Android Automotive, Message Queuing Telemetry Transport (MQTT), and the Robot Operating System (ROS), we identify the primary security threats, including malware attacks, data manipulation, and Denial of Service (DoS) attacks. …”
Get full text
Article -
1651
The Influence of Aggregate Size and Binder Material on the Properties of Pervious Concrete
Published 2014-01-01“…Moreover, compared with the control, the cement paste containing silica fume demonstrated poor resistance to sulfate attacks, and the difference in the water permeability between such specimen and the control was not noticeable.…”
Get full text
Article -
1652
Jak se ubránit před válkou? Snahy šlechticů o ochranu vrchnostenských měst za třicetileté války (Vilém Slavata a Jindřichův Hradec 1631–1633)
Published 2015-10-01“… Using the particular example, the contribution analyzes the defence strategies by means of which, in the early 1630s – in connection with the Saxon invasion of the Czech lands - Bohemian Obristkanzler Wilhelm Slavata attempted to protect his estates on the border of southern Bohemia and southern Moravia both from attacks of enemy troops and the soldiers passing through and staying in seigniorial services. …”
Get full text
Article -
1653
Adjusted automata learning algorithm for security protocol adaptive model checking
Published 2015-11-01“…Modifications and improvements for adjusted automata learning algorithms,which were enabled by recent developments.Adjusted automata learning algorithm L<sub>a</sub>* is correct and efficient.It will be helpful to improve adaptive model checking efficiency,reduce the cost,solve state space explosion problem and resist many kinds of attack methods for security protocols.…”
Get full text
Article -
1654
Two improved content extraction signature schemes
Published 2017-04-01“…Motivated by the idea of batch signatures,two variants of content extraction signature schemes based on commit vector and RSA respectively were presented.In the proposed schemes,the efficiency of signing and verification were improved by unifying certain message.The analysis show that the proposed schemes are existentially unforgeable under chosen message attacks in the random oracle model.…”
Get full text
Article -
1655
La Mauritanie à l’épreuve de l’islamisme et des menaces terroristes
Published 2008-04-01“…Since a few weeks, Mauritania is in front of several terrorist attacks claimed by Al-Qaïda in Maghreb. Radical Islamism is not new in this country but terrorism and violence of these acts are totally unheard. …”
Get full text
Article -
1656
Research of location privacy protection in wireless sensor network
Published 2017-11-01“…For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.…”
Get full text
Article -
1657
Being proactive about media engagement in first aid education
Published 2019-02-01“…Having used Google Analytics to monitor the correlation between first aid phone app usage spikes and external media events such as news reports of terrorist attacks and popular shows featuring medical emergencies in their content, the conference explores the potential of appropriately utilizing media engagement to various ends based on timing, circumstance, and locational proximity.…”
Get full text
Article -
1658
ID-based transitive signature schemes without random oracle
Published 2010-01-01“…Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s transitivity of the proposed scheme was reduced to the CDH assumption based on the bilinear pairing.A complexity analysis of the proposed scheme was thereafter presented.…”
Get full text
Article -
1659
Battue ou chasse à courre, en Somalie ou en Asie
Published 2024-03-01“…Since last August, there were markedly more attacks registered off the Horn of Africa. The lack of coordination between the numerous initiatives is making surveillance operations inefficient. …”
Get full text
Article -
1660
Florida's Invaders: Exotic Pests
Published 2003-02-01“… Florida's natural ecosystems are increasingly coming under attack by invading exotic species which displace native species, thereby degrading the diversity of floral and faunal resources. …”
Get full text
Article