Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3861
Mechanisms and influencing factors of cultural ecosystem services value realization
Published 2025-06-01Get full text
Article -
3862
Microbial mechanisms underlying the reduction of N2O emissions from submerged plant covered system
Published 2025-09-01Get full text
Article -
3863
What is the near-natural catchment? An application of hydrological signatures assessment
Published 2025-02-01Get full text
Article -
3864
Implementation of Coding Theory with The Extended Hamming Code in Steganography
Published 2024-01-01“…Data security needs to be considered to avoid noise when sending data or data breaches by hackers. …”
Get full text
Article -
3865
Shamir-based virtual machine placement policy
Published 2019-10-01“…In order to alleviate the harm of co-location attack in cloud environment,a virtual machine placement strategy based on Shamir was proposed,and a virtual machine placement framework was designed.The security of key data was ensured by the blockchain in the proposed placement strategy.The virtual machine placement policy could effectively improve the security of the virtual machine and the load balancing capability of the cloud environment,and reduce resource waste.Finally,the effectiveness of the scheme is proved by simulation experiments.…”
Get full text
Article -
3866
Fragile watermarking technique for detecting image
Published 2017-07-01“…Aiming at the problem of image tampering and forensic localization,a fragile watermarking algorithm based on chaos sequence and image QR decomposition was proposed to determine the image tampering.The algorithm chooses QR decomposition to decompose the image,embeds the watermark after the image is decomposed,and encrypts the watermark by chaotic system to enhance the security of the watermark.Experimental results show that the algorithm not only improves the security of the location watermarking algorithm,but also can estimate the tampering strength of the tampered area.…”
Get full text
Article -
3867
Utilization of Sandy Soil as the Primary Raw Material in Production of Unfired Bricks
Published 2018-01-01Get full text
Article -
3868
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01“…A lightweight cryptographic design is required for securing the data revolving around constrained devices. …”
Get full text
Article -
3869
Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions
Published 2025-01-01“…However, these approaches also face significant security challenges due to the potential exposure of mouse input data. …”
Get full text
Article -
3870
Quantum algorithms for enhanced educational technologies
Published 2025-01-01“…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
Get full text
Article -
3871
Review of communication optimization methods in federated learning
Published 2024-12-01“…With the development and popularization of artificial intelligence technologies represented by deep learning, the security issues they continuously expose have become a huge challenge affecting cyberspace security. …”
Get full text
Article -
3872
-
3873
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01“…To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockchain.The consortium blockchain was introduced into the cross-domain authentication scene by designing the layered cross-domain authentication architecture including entity layer, proxy layer, blockchain layer and storage layer.In the storage layer, abstract data format was designed and stored in the chain, and the complete data corresponding to the abstract data was stored in the interplanetary file system under the chain.This safe and reliable on-chain distributed storage scheme solved the limitation problem of on-chain storage caused by introduction of blockchain.Besides, an identity management scheme based on permanent autonomy identity and temporary identity was proposed to solve the challenges that it is difficult to cancel identity and to supervise anonymous identity after combining IBC system.On this basis, complete cross-domain full authentication, re-authentication and key negotiation protocols were designed to implement the cross-domain authentication process.In terms of security, SVO logic was used to analyze the authentication protocol, and the security of the cross-domain authentication protocol was proved.The performance of calculation overhead, communication overhead and consortium blockchain were tested and analyzed by simulation.Analysis results showed that the protocol satisfies the security requirements and has improved calculation overhead performance on both server and client sides, comparing with other related works.In terms of communication overhead, it also has better performance.The query/write latency was tested by the consortium blockchain tool, and the results showed that the scheme has good usability.…”
Get full text
Article -
3874
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01“…Efficient deduplication and secure file sharing in the cloud have emerged as critical concerns. …”
Get full text
Article -
3875
Single-Pixel Compressive Digital Holographic Encryption System Based on Circular Harmonic Key and Parallel Phase Shifting Digital Holography
Published 2022-01-01“…The obtained results show that the proposed encryption scheme is feasible and has better security performance and robustness.…”
Get full text
Article -
3876
Mutual-information of meteorological-soil and spatial propagation: Agricultural drought assessment based on network science
Published 2025-01-01“…Agricultural drought causes serious harm to food security and vegetation ecosystems, and challenges the entire food-water-energy-health-environment nexus, complicating, in turn, management strategies. …”
Get full text
Article -
3877
-
3878
-
3879
Mechanism of Photocatalytic Degradation of Diclofenac in Water by a Novel Carbon Nitride
Published 2025-01-01Get full text
Article -
3880