Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3601
-
3602
Correction: The widening gender wage gap in the gig economy in China: the impact of digitalisation
Published 2025-01-01Get full text
Article -
3603
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network
Published 2013-05-01“…Usually multiple nodes located in different regions provide data with different security levels, and it is critical to ensure the security of the information flow in the composite services. …”
Get full text
Article -
3604
An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
Published 2013-05-01“…Wireless sensor networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. …”
Get full text
Article -
3605
AVRUPA BİRLİĞİ ve IRAK KRİZİ : BÖLÜNMEDEN YENİDEN BİRLEŞMEYE UZUN, İNCE BİR YOL
Published 2003-01-01“…The aim of this article is to assess the implications of the recent Iraqi crisis for American-European relations, the European Union's evolving Common Foreign and Security Policy/ European Security and Defence Policy and the future prospects for global governance. …”
Get full text
Article -
3606
AMTD:a way of adaptive moving target defense
Published 2018-01-01“…Moving target defense is a new way to change the asymmetry state between attack and defense,by dynamically moving target’s attacking surface.Frequency conversion of MTD is of great importance for the weighing between usability,security and defense cost.Nowadays,however,frequency conversion is usually determined by manager’s experience,which cannot create a balance between usability and security cost for the lack of theory basis.An adaptive moving target defense framework(AMTD)was proposed.AMTD can maximize system security at the lowest cost while ensuring that the system is available.The adaptability of AMTD has two modes.Firstly,the defense mode,it contains an adaptive conversion strategy to provide reacting defense triggered by security alerts and active defense triggered by timer expiration events.The other mode is the frequency conversion,which obtain the optimal conversion frequency by establishing mathematical models.Four series of simulation experiments were taken to verify the effectiveness of the solution.…”
Get full text
Article -
3607
Network slicing deployment method based on isolation level
Published 2020-04-01“…In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.…”
Get full text
Article -
3608
Intelligent terminal device identification method of internet of things
Published 2017-02-01“…The correct identification of the terminal of the internet of things is an important prerequisite to establish a secure connection of the internet of things.The identification of the intelligent terminal is particularly important.The device identification method of intelligent terminals in internet of things under the existing technology was investigated.From the perspective of the security of the internet of things,the security problem that the device identification method was too simple to be easily falsified of the existing scheme was analyzed.Combining the achievements of project research in the field of internet of things and the experience of the industry,the identification method of multidimensional device feature information of IoT intelligent terminals was proposed.…”
Get full text
Article -
3609
Bitcoin blockchain based information convert transmission
Published 2021-02-01“…To meet efficient, safe, covert and stable transmission of confidential information, the transaction data structures, location and capacity of potential convert channels were analyzed.Then a formal security model of covert transmission in the bitcoin blockchain environment was proposed, which would not break the transaction structures, add special transaction content, can overcome shortcomings of traditional convert channels and protect the anonymity of both sender and receiver.The proposed security model opens a promising avenue of covert transmission, which is of great significance to promote the secure transmission technologies for the national special applications.…”
Get full text
Article -
3610
Mobile RFID system authentication protocol based on one-way pseudo random function
Published 2017-06-01“…Aiming at the cost,efficiency and security of mobile RFID system authentication,a mobile RFID authentication protocol based on one-way pseudo random function was designed.The protocol reduced system cost by making full use of the three party of the shared key and communication information to encrypt transmission and authentication.Through the implementation of three party authentication and key update work,the agreement suffered counterfeit,desynchronization and other attacks was avoided.Finally,the logical proof of GNY and its security and performance analysis were gived to show the feasibility and security of the new protocol.…”
Get full text
Article -
3611
Efficiency identity-based threshold group signature scheme
Published 2009-01-01“…Threshold group signature was used to guarantee the security of the collective decision.To improve the efficiency,a new identity-based cryptography threshold group signature scheme was proposed basing on bilinear pairing and secret sharing.In this scheme,the master key was distributed into the whole group and the user’s signature key was stored in a threshold way,these methods ensured the whole security of signature systems.The scheme with a identity-based t-out-of-n secret sharing algorithm was highly-efficient.The careful analysis and the comparison of computational efficiency show that this scheme is secure and efficient.…”
Get full text
Article -
3612
Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity
Published 2024-01-01“…To secure the massive amounts of secret messages, the integrity and confidentiality challenges must be addressed. …”
Get full text
Article -
3613
Machine Learning-Based Network Detection Research for SDNs
Published 2025-01-01“…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. …”
Get full text
Article -
3614
A Trusted Federated Learning Method Based on Consortium Blockchain
Published 2024-12-01“…However, traditional FL methods face challenges in ensuring trust, security, and efficiency, particularly in heterogeneous environments with varying computational capacities. …”
Get full text
Article -
3615
Corrosion Activity on CFRP-Strengthened RC Piles of High-Pile Wharf in a Simulated Marine Environment
Published 2017-01-01Get full text
Article -
3616
Transforming Alliances: A 20-Year Overview of Singapore-US Relations under Lee Hsien Loong
Published 2025-01-01“…It also examines how both countries have expanded their cooperation into non-traditional security areas such as counterterrorism, cybersecurity, and environmental security, adapting to the evolving global security environment. …”
Get full text
Article -
3617
Exploring Age and Gender Differences in ICT Cybersecurity Behaviour
Published 2022-01-01“…Older users appear less likely to secure their devices compared to younger users; however, the reverse was found for the other behaviours, with older users appearing more likely to generate secure passwords and show proactive risk awareness and regularly install updates. …”
Get full text
Article -
3618
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
Published 2018-04-01“…To ensure the security and privacy of patients’ health data in wireless body area network (WBAN),communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side,a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity,mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes,the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced,which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.…”
Get full text
Article -
3619
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01“…The structure and properties of S-boxes have a significant impact on the overall security of cryptographic systems. This article aims to improve cryptographic security through unique S-box construction methodologies. …”
Get full text
Article -
3620
Is the Financing of German Health and Long-Term Care Insurance Sustainable?
Published 2020-08-01“…Thus the sustainability of the German social security system is severely jeopardised.…”
Get full text
Article