Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4201
Masked and Unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race.
Published 2023“…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
Get full text
Article -
4202
Masked and unmasked Face Recognition Model Using Deep Learning Techniques. A case of Black Race.
Published 2024“…Currently, many institutions of higher learning in Uganda are faced with major security threats ranging from burglary to cyber threats. …”
Get full text
Article -
4203
Technological requirements and challenges of body area networks
Published 2018-09-01“…With the development of ubiquitous networks and huge requirements of tele-medicine,an emerged new technology of body area network (BAN) has attracted extensive attention.BAN system could be used for medical,personal health and entertainment applications by implanting wireless sensors into or around the human body,which realized real-time detection and diagnosis of physical vital signs.However,BAN had more stringent requirements on power consumption,quality of service (QoS),security performance and other specifications.Based on its technological requirements,the research status and development trends of key technologies were discussed deeply,such as information perception of vital signs,wireless transmission,information security and integrated circuit design,and the faced challenges in applications were analyzed.…”
Get full text
Article -
4204
McEliece public key cryptosystem attack algorithm based on enumeration error vector
Published 2014-05-01“…The research on the security of McEliece (M) public key cryptosystem was presented. …”
Get full text
Article -
4205
Lightweight authentication protocol for RFID
Published 2013-08-01“…LAP is based on the generalized inverse matrix and only uses CRC checksum, some matrix and simple logic operations to satisfy the principles of balancing security, privacy and cost. The comparisons of security, privacy and performance with other authentication protocols show that LAP is feasible for RFID tags with requirements of low cost and resource-constrained.…”
Get full text
Article -
4206
A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks
Published 2013-08-01“…We argue that the approach is able to support secure end-to-end communication in wireless sensor networks.…”
Get full text
Article -
4207
An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection
Published 2014-01-01“…In this paper, under the assumption that security returns are given by experts’ evaluations rather than historical data, we discuss the portfolio adjusting problem which takes transaction costs and diversification degree of portfolio into consideration. …”
Get full text
Article -
4208
Lattice-based verifiable timed signature and application
Published 2024-10-01“…As a result, it exhibited exemplary security performance. Moreover, LVTS could be seamlessly integrated into electronic auction protocols (LVTS-EA) to enhance efficiency, security, and fairness in auction proceedings, offering an innovative and pragmatic solution for the electronic auction domain.…”
Get full text
Article -
4209
Development status and trend of space information network and laser communication
Published 2019-06-01“…An integrated space-earth information network is an important symbol of a strong country in science and technology.According to China’s overall plan,an information network with global coverage,on-demand services,local access and security and credibility will be built by 2030 to serve national defense and social development.Space laser communication is an important means to realize high speed information transmission and security.Firstly,space-earth integration network was introduced from three aspects:concept connotation and system architecture,research status and development trend,overall goal and main difficulties.Then,the concept,characteristics,research status and development trend of space laser communication were summarized in order to provide useful reference for the construction of space-earth integrated information network in China.…”
Get full text
Article -
4210
Research on collaborative resource optimization technology based on convergence of computing, control and communication in Internet of vehicles
Published 2023-04-01“…Internet of vehicles is highly dynamic and has diverse application types, including both security and non-security applications.How to satisfy differentiated requirements at the same time is one of the major challenges that Internet of vehicles face.Therefore, the convergence of computing, control and communication in Internet of vehicles was investigated, and the necessity of the collaborative management of multi-dimensional resources was outlined to improve both the driving safety and the quality of experience.Specifically, the control and communication convergence mechanism for autonomous driving, the computing and communication resource collaborative management mechanism for infotainment application, and the multi-dimensional resource collaborative management mechanism for differentiated application concurrency were introduced respectively according to the application characteristics.Finally, the technology development trend of this field was discussed based on related challenge analysis.…”
Get full text
Article -
4211
Une doctrine implicite de la déterritorialisation
Published 2009-12-01“…The implicit doctrine promote control and closed boundaries in the field of security and migrations but selective sovereignty for economic purpose to the profit of the power strongholds which assign peripheries to a function of exploitable and secured spaces.…”
Get full text
Article -
4212
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01“…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
Get full text
Article -
4213
Définir l’ennemi national. La restauration sécuritaire du président égyptien al-Sisi
Published 2016-12-01“…Muslim-Christian Unity; in the name of security, it steadily reproduces an enemy within.…”
Get full text
Article -
4214
Design and implementation on remote disaster recovery system based on Goldengate
Published 2018-04-01“…As telecom business-critical systems become more and more important,the demand for IT classes has also increased.The IT system should be more reliable,faster and easier to use and to adapt better to changing business needs.On the other hand,the security risks are also increasing.The concept of synchronous replication technology and the realization theory of Goldengate was focused on,the characteristics and advantages of the technology were discussed.Through the analysis of actual cases,the feasibility of using Goldengate data replication technology was verified,the data real-time backup was realized,the core database security was ensured while avoiding the introduction of too many categories software,and the complexity of operation and cost inputs was reduced,also it is conducive to the recovery of disaster recovery system and real-time switching.…”
Get full text
Article -
4215
Open service platform for IoT
Published 2016-02-01“…In addition,a usage authorization mechanism was proposed to support security and privacy in the IoT environment, contributing to a scalable,secure and reliable intelligence open service platform for IoT.Finally,a prototype system was designed and concrete system was given to verify the feasibility and superiority of the proposed architecture.…”
Get full text
Article -
4216
Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization
Published 2016-01-01“…In view of the digital image transmission security, based on laser chaos synchronization and Arnold cat map, a novel image encryption scheme is proposed. …”
Get full text
Article -
4217
A differential game model of intrusion detection system in cloud computing
Published 2017-01-01“…The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. …”
Get full text
Article -
4218
Progress of research on privacy protection for data publication and data mining
Published 2016-01-01“…So it is particularly important to improve the security of data and protect the useful data to avoid being disclosed. …”
Get full text
Article -
4219
«HYBRID WAR» OF NOTIONS
Published 2016-10-01“…Ofer Fridman holds the degrees of BA (Military History and Security Studies) from Hebrew University, MA (Counter-Terror and Homeland Security) from Interdisciplinary Center Herzliya and PhD (Political Science, supervised by Prof. …”
Get full text
Article -
4220
Efficient ID-based certificateless signature scheme
Published 2008-01-01“…Under the random oracle model, the new scheme was proved to be secure against existential forgery on adaptively chosen message and ID attack. …”
Get full text
Article