Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3761
Quantum Key Relay Scheme Based on Trusted Control Center
Published 2014-06-01“…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
Get full text
Article -
3762
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01“…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
Get full text
Article -
3763
High-Order Observer-Based Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties
Published 2020-01-01“…System security is essential for the operation of the island microgrid. …”
Get full text
Article -
3764
A Hybrid Approach to Protect Palmprint Templates
Published 2014-01-01“…Accuracy, changeability, and security are three critical requirements for template protection algorithms. …”
Get full text
Article -
3765
Overview of research on trusted attestation technology of cloud virtualization platform
Published 2021-12-01“…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
Get full text
Article -
3766
Survey on privacy preserving techniques for blockchain
Published 2018-09-01“…Blockchain is a kind of distributed ledger technology with the characteristics of decentralization,security reliability,tamper-proof and programmable.The open and transparent feature of the blockchain system has seriously threatened the transaction privacy of users,and the corresponding privacy problem solution is designed for different application scenarios.Firstly,the basic working principle of block chain technology was introduced,and typical privacy issues was introduced in blockchain,such as transaction privacy and account privacy.Secondly,the existing typical blockchain privacy protection schemes were divided into three types:mixed-coin technology,cryptography technology and secure channel technology,and presents a comprehensive and comprehensive introduction to this three privacy protection schemes; Finally,the blockchain data privacy protection technology was analyzed,the application and development on IoT security were prospeted.…”
Get full text
Article -
3767
Hybrid Cryptography Based on Planets: Phobos & Deimos
Published 2025-01-01“…Remote access has become essential for business continuity but also introduces significant security risks. To address these issues, it is crucial to innovate in cryptography, the backbone of data security. …”
Get full text
Article -
3768
Comparison of Military Potentials of USA, PRC, and Some Countries in APR from the Standpoint of Western Analysts
Published 2012-08-01“…In connection with the rising significance of the APR in the global economy, Western military and political analysts consider the PRC power strengthening as a challenge to the security and impact of the USA not only in this region, but also globally. …”
Get full text
Article -
3769
-
3770
Les syndicats, les commissaires et le politique : (re)valorisations et conflits autour de la profession policière en Tunisie (2011-2022)
Published 2023-12-01“…After 14 January 2011, the socio-professional conditions of members of the security forces became increasingly public, but also led to an unprecedented mobilisation of Tunisian police officers. …”
Get full text
Article -
3771
Visceral Adiposity Index in Breast Cancer Survivors: A Case-Control Study
Published 2020-01-01Get full text
Article -
3772
Blockchain-IoT Healthcare Applications and Trends: A Review
Published 2024-01-01“…Integrating blockchain technology with IoT extensively helps provide basic security requirements owing to the built-in security structure of the blockchain. …”
Get full text
Article -
3773
Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
Published 2019-01-01“…In recent years, with the rapid development of the Internet and the Internet of Things, network security is urgently needed. Malware becomes a major threat to network security. …”
Get full text
Article -
3774
Filipino attitude and perception on Subscriber Identity Module (SIM) Card Registration Act
Published 2024-12-01“…These insights underscore the need for more robust security measures in the registration process to enhance public trust. …”
Get full text
Article -
3775
Water Accounting and Productivity Analysis to Improve Water Savings of Nile River Basin, East Africa: From Accountability to Sustainability.
Published 2024“…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
Get full text
Article -
3776
-
3777
Do relationships with parents determine citizens’ reactions to war trauma?
Published 2024-02-01“…In contrast, a secure attachment style, along with frustration of the need for competence and intensity of threats, is a predictor of constructive defenses, while a secure attachment style is a predictor of PTG. …”
Get full text
Article -
3778
System-Level Digital Twin Modeling for Underwater Wireless IoT Networks
Published 2024-12-01“…We introduce a voting-based security prediction model to significantly bolster security in underwater wireless communication. …”
Get full text
Article -
3779
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01“…The security flaws of the group signature proposed by Zhang Jianhong and etc.was analyzed.It pointed out that the group signature was not untraceable for the revocation center could not open a valid group signature.A coalition attack that the manager and the revocation center could conspire to generate valid group signatures and impose them on an arbitrary member of the group was presented.The security analysis show that the scheme is insecure.…”
Get full text
Article -
3780
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01“…The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.…”
Get full text
Article