Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3781
Hybird group key management scheme for wireless sensor networks
Published 2010-01-01“…Since sensor nodes join or leave the wireless sensor networks frequently,it is necessary to build a secure and efficient group key management system.An efficient and secure group key management scheme was proposed.Private-key cryptosystems are used to encrypt multicast messages and rekey the group when new nodes join the group,while the tech-nology of identity-based broadcast encryption is used to distribute the group key and rekey the group when nodes leave the group.The proposed scheme satisfies the desired security properties,such as forward secrecy,backward secrecy and collusion resistant.Compared with existing group key management schemes in wireless sensor networks,the scheme can efficiently reduce key storage and communication overhead of rekeying messages.As storage overhead and rekeying cost of nodes are not dependent of the scale of networks,the proposed scheme is applicable to wireless sensor networks.…”
Get full text
Article -
3782
In Favor of Endowing the Energy and Climate Fund with Borrowing Powers
Published 2022-06-01“…Abstract Energy security and independence are the new imperatives following the war of aggression on Ukraine ordered by Vladimir Putin. …”
Get full text
Article -
3783
-
3784
CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks
Published 2014-01-01“…In this paper, we present a novel intrusion detection mechanism for WSNs, which is composed of a secure data communication algorithm and an intrusion detection algorithm. …”
Get full text
Article -
3785
دور تحلیلات البیانات الضخمة فى انترنت الأشیاء : دراسة تحلیلیة مقارنة
Published 2020-04-01“…The study Aimed to Identify in a Relation Ship big data analytics in IOTapplications benefits big data in internet of things , and Show the most popularplatforms to big data and IOT such as : Kaa , Hadoop , MAPR , and study therequirements of big data analytics in IOT finally show challenges facing big datain IOT the study was approved on the comparative method and reached severalresults the most important of them , the main problems that you face big data inIOT security and privacy 97%The most important results of the study : Big data and the Internet of things are complementary to each other, andthis integration is achieved through data analysis platforms. One of the most common security problems in IoT applications with bigdata is data center security, access control, redundant data filtering. One of the standards of open source Internet of Things platforms isstandards of integration, security and confidentiality, protocols,visualization support, databases. One of the most used big data analytics platforms is Hadoop, with apercentage of 90%, followed by Map R with 72.3%. …”
Get full text
Article -
3786
Ground Zero(3): Inside the New American Home
Published 2011-09-01“…This paper will consider the role of such collections and exhibitions in relation with other post-9/11 mechanisms of cohesion and control, such as the Homeland Security Department, the Security Fence and the Secure Border Initiative, as well as the role of museums and a “war museology” in relation to these other cultural enclosing devices and domestic military strategies.…”
Get full text
Article -
3787
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01“…The security of the verifiable federated aggregation method was demonstrated through formal security analysis, which effectively resists forgery attacks and Sybil attacks, exhibiting good robustness. …”
Get full text
Article -
3788
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Published 2013-01-01Get full text
Article -
3789
Hybrid-chain-based supervision scheme for privacypreserving trading system
Published 2023-12-01“…Due to its characteristics of decentralization, transparency, and security, blockchain technology is widely used in finance, the Internet of Things, and supply chain.However, along with the opportunities it brings, the application of blockchain technology also presents new challenges.On one hand, traditional centralized regulatory methods can undermine the decentralized and autonomous nature of blockchain, creating regulatory dilemmas.On the other hand, blockchain-based systems require privacy protection as transactions often contain sensitive information beyond currency amounts.Failure to protect privacy can result in information leakage and make it difficult for authorities to monitor transactions.To address these challenges and enable regulation in privacy-preserving blockchain-based trading systems, a hybrid chain framework was proposed.This framework incorporated a multiple committee-based approach for general cross-chain regulation.Separate committees were established for the supervision chain and service chain.The service chain committee handled service chain data, generating and sending proofs to the supervision chain to achieve private supervision.In addition to single-chain regulation, cross-chain communication committees and supervision committees collaborated to achieve cross-chain transaction supervision among different service chains.Through a security analysis, it is proven that the proposed scheme is secure when each module meets its security requirements.Experimental evaluations have been conducted to demonstrate the feasibility of the proposed scheme, showing that it achieves cross-chain supervision at a low cost and is scalable.…”
Get full text
Article -
3790
Une évaluation de l’impact des politiques de l’administration Bush sur les exportations canadiennes dans le contexte de l’Accord de libre-échange nord-américain
Published 2010-03-01“…We evaluate the effects of US security policies adopted in the wake of these events, which caused the economic dimension of the North American partnership to be in part subordinated to the security dimension. …”
Get full text
Article -
3791
Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
Published 2017-01-01Get full text
Article -
3792
Individual health passport storage, sharing and verification scheme based on blockchain
Published 2024-04-01“…This enhancement minimized the computational load associated with signature verification and facilitated the swift identification of potential malicious forgers. An exhaustive security analysis was conducted to substantiate the scheme's security and dependability. …”
Get full text
Article -
3793
Identification and bioinformatics analysis of the DUS gene in Eimeria media
Published 2025-01-01Get full text
Article -
3794
Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm
Published 2025-01-01“…In order to guarantee the complete security of the IoT, it is important to deal with these challenges. …”
Get full text
Article -
3795
Intrusion detection in metaverse environment internet of things systems by metaheuristics tuned two level framework
Published 2025-01-01“…Nevertheless, because IoT devices are often built with minimal hardware and are connected to the Internet, they are highly susceptible to different types of cyberattacks, presenting a significant security problem for maintaining a secure infrastructure. …”
Get full text
Article -
3796
Official Development Assistance in Japan's Strategy in Central Asia
Published 2020-07-01“…The author comes to the conclusion that realism-based objectives such as getting access to the natural resources of the region, securing its geopolitical stance in the heart of Eurasia and ensuring the support for Japan’s bid to the UN Security Council seat by five Central Asian states dominate Japan’s ODA policy. …”
Get full text
Article -
3797
A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
Published 2024-01-01“…As a concern of its huge evolution, privacy, and security are vital problems where IoT devices are always susceptible to cyberattacks. …”
Get full text
Article -
3798
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01“…Data security and privacy are crucial for the Internet of Medical Things (IoMT) and the digitization of healthcare systems. …”
Get full text
Article -
3799
-
3800
Study of Row Hammer attack
Published 2018-01-01“…The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.…”
Get full text
Article