Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4001
Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm
Published 2021-03-01“…The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parzen-HW、MLE-HE、HW-HE and HW-MLE-HE.Among them, the novel proposed distinguishers of MLE-HE、HW-HE and HW-MLE-HE can effectively reduce the faults and improve the attack efficiency in simulating experiments.It provides a significant reference for analyzing the security of lightweight ciphers in the Internet of Things.…”
Get full text
Article -
4002
Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
Published 2012-11-01“…Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols.…”
Get full text
Article -
4003
Scheme of node identify authentication in distributed file interaction system
Published 2013-08-01“…Advantages of the novel project are to produce fair session key to both communications, and design the two different types of authentication:within the network and across a network authentication. Then the security of this scheme was analyzed. The scheme is more secure than the former ones and it can protect the privacy of users and non-repudiation, and has lower computa-tional cost. …”
Get full text
Article -
4004
Hierarchical certificateless authenticated key agreement protocol
Published 2016-07-01“…A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption. …”
Get full text
Article -
4005
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Information security has been the most common word uttered by any man any device or any peripheral for the past two centuries. …”
Get full text
Thesis -
4006
-
4007
-
4008
PDMS microspheres as rheological additives for PDMS-based DIW inks
Published 2025-01-01Get full text
Article -
4009
Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok)
Published 2019-12-01“…In this study, we conducted an audit of the security of wifi networks in Depok City by conducting field studies on the performance and security of wifi networks using wardriving techniques.This study covers about 536 wifi networks on Margonda Street Depok. …”
Get full text
Article -
4010
-
4011
Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform
Published 2022-11-01“…Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
Get full text
Article -
4012
Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations
Published 2019-01-01“…And hence how to enhance the security of images has become a hot topic in the field of information security. …”
Get full text
Article -
4013
Resilient Privacy Preservation Through a Presumed Secrecy Mechanism for Mobility and Localization in Intelligent Transportation Systems
Published 2024-12-01“…The empirical results indicate a 25% reduction in computational overhead and a 30% enhancement in privacy protection over conventional methods, demonstrating the model’s efficacy in secure ITS communication. Compared with existing methods, the proposed approach decreases security depletion rates by 15% across varying traffic densities, underscoring ITS resilience in high-interaction scenarios.…”
Get full text
Article -
4014
Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding
Published 2020-01-01“…As computational ghost imaging is widely used in the military, radar, and other fields, its security and efficiency became more and more important. …”
Get full text
Article -
4015
Integration of National Chemical Hazards Monitoring, Total Diet Study, and Human Biomonitoring Programmes for Food Safety Exposure Assessment in Singapore
Published 2025-01-01“…Food safety and food security can impact the quality of human life, and these two aspects are interrelated alongside many influencing external factors. …”
Get full text
Article -
4016
Police Powers and Commitments in Controlling Violence arising from Assemblies: A Comparative Study of Iranian Law and International Human Rights Law
Published 2024-06-01“…The peaceful holding of rallies and the important role played by the police and other security forces in securing them are among the important issues that need to be addressed. …”
Get full text
Article -
4017
Legislation and Policy Capacities in Agricultural Water for Adapting to Climate Change in Iran
Published 2025-07-01“…Iran has taken various initiatives, enacting related laws and establishing policy measures, to respond to water scarcity and food security in the agricultural sector. This study was conducted to understand and explore Iran’s initiatives, especially through legislation and policy responses, to address water scarcity and food security under CC conditions. …”
Get full text
Article -
4018
Integrated Dairy Production and Cattle Healthcare Management Using Blockchain NFTs and Smart Contracts
Published 2025-01-01“…Efficient cattle healthcare management is vital for ensuring productivity and welfare in dairy production, yet traditional record-keeping methods often lack transparency, security, and efficiency, leading to challenges in livestock product quality and healthcare. …”
Get full text
Article -
4019
Epilepsy Prediction and Detection Using Attention-CssCDBN with Dual-Task Learning
Published 2024-12-01Get full text
Article -
4020
Effects of image compression on face image manipulation detection: A case study on facial retouching
Published 2021-05-01Get full text
Article