Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3941
Privacy-preserving mining of association rules based on paillier encryption algorithm
Published 2016-01-01“…In privacy preserving association rule mining, the precision and security of mining are always a pair of contradictions. …”
Get full text
Article -
3942
-
3943
-
3944
-
3945
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Without security, the message is often utilized by an irresponsible person. …”
Get full text
Article -
3946
Properties of solutions to a second order nonlinear differential equation
Published 1990-01-01Get full text
Article -
3947
On the boundedness and oscillation of solutions to (m(t)x′)′+a(t)b(x)=0
Published 1987-01-01Get full text
Article -
3948
Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks
Published 2017-06-01“…In addition, the introduction of the malicious behavior feedback mechanism ensures the security of sensors in the mobile agent system. The experimental results show that the reputation model of incomplete β distribution can simulate the actual situation well, resist the attacks of malicious agents, and ensure the security of sensors in the system.…”
Get full text
Article -
3949
Certificateless public key cryptography based provable data possession scheme in edge environment
Published 2022-07-01“…In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.…”
Get full text
Article -
3950
Survey on key technologies for protective DNS service
Published 2024-10-01“…It serves as the entry point for users to access Internet applications and is also the key point for client-side security threat perception and mitigation. Common DNS abuses and related security threats on the client side include phishing, malware, and other attacks based on DNS. …”
Get full text
Article -
3951
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01“…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
Get full text
Article -
3952
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
Published 2013-06-01“…In this paper, we make the first attempt to solve those two security risks together without relying cryptography. …”
Get full text
Article -
3953
Towards DevSecOps Model for Multi-tier Web Applications
Published 2024-01-01“…Development, Security and Operations (DevSecOps) as part of Continuous Deployment (CD) or Continuous Delivery (CD) are considered a reliable link for communication and collaboration between development, security and operations teams. …”
Get full text
Article -
3954
Impacts of Cultivated Land Reclamation on the Climate and Grain Production in Northeast China in the Future 30 Years
Published 2013-01-01“…The result of this study can provide some theoretical support to the agricultural economic development in Northeast China and serve the national macropolicy and food security strategy of the whole China.…”
Get full text
Article -
3955
Fuzzy-Based Trust Prediction Model for Routing in WSNs
Published 2014-01-01“…The sensitive application environments and resource constraints of WSNs mandate the requirement of lightweight security scheme. The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nodes in the network. …”
Get full text
Article -
3956
Secret sharing-based authentication and key agreement protocol for machine-type communications
Published 2019-04-01“…The comparisons regard security properties and computational and communication costs. …”
Get full text
Article -
3957
Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks
Published 2024-12-01“…Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. …”
Get full text
Article -
3958
Research on Indoor Positioning Systems and Autonomous Mechatronic Systems for Surveillance of Intrabuilding Zones
Published 2025-01-01“…Given increasingly complex threats, adapting surveillance approaches to meet the necessary security levels is essential. The aim of this paper is to develop a surveillance architecture based on autonomous mechatronic systems (mobile robots and drones) designed to secure areas of strategic interest, covering a predefined space while providing enhanced security at minimal costs. …”
Get full text
Article -
3959
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
Published 2020-01-01“…Consequently, a good trade-off efficiency and security can be achieved. Furthermore, the numerical simulations and performance analyses illustrate that the proposed encryption scheme can be used in practical application scenarios requiring lightweight security.…”
Get full text
Article -
3960
Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks
Published 2013-04-01“…Image authentication is critical for secure image transmission and storage in a wireless multimedia sensor network (WMSN). …”
Get full text
Article