Showing 3,781 - 3,800 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 3781

    Hybird group key management scheme for wireless sensor networks by CHEN Yan-li1, YANG Geng3

    Published 2010-01-01
    “…Since sensor nodes join or leave the wireless sensor networks frequently,it is necessary to build a secure and efficient group key management system.An efficient and secure group key management scheme was proposed.Private-key cryptosystems are used to encrypt multicast messages and rekey the group when new nodes join the group,while the tech-nology of identity-based broadcast encryption is used to distribute the group key and rekey the group when nodes leave the group.The proposed scheme satisfies the desired security properties,such as forward secrecy,backward secrecy and collusion resistant.Compared with existing group key management schemes in wireless sensor networks,the scheme can efficiently reduce key storage and communication overhead of rekeying messages.As storage overhead and rekeying cost of nodes are not dependent of the scale of networks,the proposed scheme is applicable to wireless sensor networks.…”
    Get full text
    Article
  2. 3782

    In Favor of Endowing the Energy and Climate Fund with Borrowing Powers by Steffen Murau, Jan-Erik Thie

    Published 2022-06-01
    “…Abstract Energy security and independence are the new imperatives following the war of aggression on Ukraine ordered by Vladimir Putin. …”
    Get full text
    Article
  3. 3783
  4. 3784

    CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks by Bishan Ying

    Published 2014-01-01
    “…In this paper, we present a novel intrusion detection mechanism for WSNs, which is composed of a secure data communication algorithm and an intrusion detection algorithm. …”
    Get full text
    Article
  5. 3785

    دور تحلیلات البیانات الضخمة فى انترنت الأشیاء : دراسة تحلیلیة مقارنة by د. یارة ماهر قناوى

    Published 2020-04-01
    “…The study Aimed to Identify in a Relation Ship big data analytics in IOTapplications benefits big data in internet of things , and Show the most popularplatforms to big data and IOT such as : Kaa , Hadoop , MAPR , and study therequirements of big data analytics in IOT finally show challenges facing big datain IOT the study was approved on the comparative method and reached severalresults the most important of them , the main problems that you face big data inIOT security and privacy 97%The most important results of the study : Big data and the Internet of things are complementary to each other, andthis integration is achieved through data analysis platforms. One of the most common security problems in IoT applications with bigdata is data center security, access control, redundant data filtering. One of the standards of open source Internet of Things platforms isstandards of integration, security and confidentiality, protocols,visualization support, databases. One of the most used big data analytics platforms is Hadoop, with apercentage of 90%, followed by Map R with 72.3%. …”
    Get full text
    Article
  6. 3786

    Ground Zero(3): Inside the New American Home by Louise LACHAPELLE

    Published 2011-09-01
    “…This paper will consider the role of such collections and exhibitions in relation with other post-9/11 mechanisms of cohesion and control, such as the Homeland Security Department, the Security Fence and the Secure Border Initiative, as well as the role of museums and a “war museology” in relation to these other cultural enclosing devices and domestic military strategies.…”
    Get full text
    Article
  7. 3787

    Verifiable federated aggregation method based on homomorphic proxy re-authentication by YANG Fan, SUN Yi, CHEN Xingyuan, GAO Qi

    Published 2024-06-01
    “…The security of the verifiable federated aggregation method was demonstrated through formal security analysis, which effectively resists forgery attacks and Sybil attacks, exhibiting good robustness. …”
    Get full text
    Article
  8. 3788
  9. 3789

    Hybrid-chain-based supervision scheme for privacypreserving trading system by Xuedan JIA, Longxia HUANG, Pujie JING, Liangmin WANG, Xiangmei SONG

    Published 2023-12-01
    “…Due to its characteristics of decentralization, transparency, and security, blockchain technology is widely used in finance, the Internet of Things, and supply chain.However, along with the opportunities it brings, the application of blockchain technology also presents new challenges.On one hand, traditional centralized regulatory methods can undermine the decentralized and autonomous nature of blockchain, creating regulatory dilemmas.On the other hand, blockchain-based systems require privacy protection as transactions often contain sensitive information beyond currency amounts.Failure to protect privacy can result in information leakage and make it difficult for authorities to monitor transactions.To address these challenges and enable regulation in privacy-preserving blockchain-based trading systems, a hybrid chain framework was proposed.This framework incorporated a multiple committee-based approach for general cross-chain regulation.Separate committees were established for the supervision chain and service chain.The service chain committee handled service chain data, generating and sending proofs to the supervision chain to achieve private supervision.In addition to single-chain regulation, cross-chain communication committees and supervision committees collaborated to achieve cross-chain transaction supervision among different service chains.Through a security analysis, it is proven that the proposed scheme is secure when each module meets its security requirements.Experimental evaluations have been conducted to demonstrate the feasibility of the proposed scheme, showing that it achieves cross-chain supervision at a low cost and is scalable.…”
    Get full text
    Article
  10. 3790

    Une évaluation de l’impact des politiques de l’administration Bush sur les exportations canadiennes dans le contexte de l’Accord de libre-échange nord-américain by Michaël Lambert-Racine, Pierre Martin, François Vaillancourt

    Published 2010-03-01
    “…We evaluate the effects of US security policies adopted in the wake of these events, which caused the economic dimension of the North American partnership to be in part subordinated to the security dimension. …”
    Get full text
    Article
  11. 3791
  12. 3792

    Individual health passport storage, sharing and verification scheme based on blockchain by GAO Hancheng, JI Haoyu, GAO Chenhao, HUANG Haiping

    Published 2024-04-01
    “…This enhancement minimized the computational load associated with signature verification and facilitated the swift identification of potential malicious forgers. An exhaustive security analysis was conducted to substantiate the scheme's security and dependability. …”
    Get full text
    Article
  13. 3793
  14. 3794

    Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm by Bambang Susilo, Abdul Muis, Riri Fitri Sari

    Published 2025-01-01
    “…In order to guarantee the complete security of the IoT, it is important to deal with these challenges. …”
    Get full text
    Article
  15. 3795

    Intrusion detection in metaverse environment internet of things systems by metaheuristics tuned two level framework by Milos Antonijevic, Miodrag Zivkovic, Milica Djuric Jovicic, Bosko Nikolic, Jasmina Perisic, Marina Milovanovic, Luka Jovanovic, Mahmoud Abdel-Salam, Nebojsa Bacanin

    Published 2025-01-01
    “…Nevertheless, because IoT devices are often built with minimal hardware and are connected to the Internet, they are highly susceptible to different types of cyberattacks, presenting a significant security problem for maintaining a secure infrastructure. …”
    Get full text
    Article
  16. 3796

    Official Development Assistance in Japan's Strategy in Central Asia by O. A. Dobrinskaya

    Published 2020-07-01
    “…The author comes to the conclusion that realism-based objectives such as getting access to the natural resources of the region, securing its geopolitical stance in the heart of Eurasia and ensuring the support for Japan’s bid to the UN Security Council seat by five Central Asian states dominate Japan’s ODA policy. …”
    Get full text
    Article
  17. 3797

    A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications by Manal Alkhammash

    Published 2024-01-01
    “…As a concern of its huge evolution, privacy, and security are vital problems where IoT devices are always susceptible to cyberattacks. …”
    Get full text
    Article
  18. 3798

    Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO by Adla Padma, Mangayarkarasi Ramaiah

    Published 2025-03-01
    “…Data security and privacy are crucial for the Internet of Medical Things (IoMT) and the digitization of healthcare systems. …”
    Get full text
    Article
  19. 3799
  20. 3800

    Study of Row Hammer attack by Wenwei WANG, Peishun LIU

    Published 2018-01-01
    “…The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.…”
    Get full text
    Article