Showing 4,341 - 4,360 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4341

    Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism by Qin Qin, Yong-qiang He, Li-ming Nie

    Published 2015-01-01
    “…In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. …”
    Get full text
    Article
  2. 4342

    Relationship Between Attachment and Social Skills in Adulthood Education in the Digital Society by Raquel Muñoz-Pradas, María de la Fuente Benítez, Antonio Palacios-Rodríguez, Mª Victoria Fernández Scagliusi

    Published 2025-01-01
    “…After carrying out the analyses, the existence of a statistically significant relationship was detected between the social skills variable and Attachment Scale 3, corresponding to subjects with good abilities to express feelings and comfort with relationships (secure attachment). It is concluded by stating that subjects who have developed a secure attachment will have more satisfactory social relationships.…”
    Get full text
    Article
  3. 4343

    Application Research of Intelligent Classification Technology in Enterprise Data Classification and Gradation System by Lina Yu, Chunwei Wang, Huixian Chang, Sheng Shen, Fang Hou, Yingwei Li

    Published 2020-01-01
    “…Classification and gradation system adopts different security protection schemes for different types of data by implementing classification and gradation management of data, which is an important pretechnical means for data security protection and prevention of data leakage. …”
    Get full text
    Article
  4. 4344

    L’école maternelle au service des besoins fondamentaux de l’enfant : résultats d’une expérimentation sur les besoins de sécurisation et d’exploration by Hélène Marquié-Dubié

    Published 2021-06-01
    “…Nursery school serving the fundamental needs of the child: an experiment on the needs for security and exploration. In this article are presented the first results obtained within the framework of an experiment of innovative class device for the nursery school (Experimental Project of Training of the Teachers of Kindergarten). …”
    Get full text
    Article
  5. 4345

    IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS by Ibnu Faiz Abdillah, Abdul Halim Hasugian, Armansyah Armansyah

    Published 2024-12-01
    “…Video steganography enhances message security by minimizing the likelihood of detecting hidden messages within the video. …”
    Get full text
    Article
  6. 4346

    LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers by Durmus Ozkan Sahin, Sedat Akleylek, Erdal Kilic

    Published 2022-01-01
    “…Application permissions, which are one of the most critical building blocks in the security of the Android operating system, are extracted through static analysis, and security analyzes of applications are carried out with machine learning techniques. …”
    Get full text
    Article
  7. 4347

    Social network-based trustworthy routing in delay tolerant networks by YU Hai-zheng1, MA Jian-feng1, BIAN Hong3

    Published 2010-01-01
    “…A trustworthy routing protocol was proposed based on social networks for delay tolerant networks(DTN),which ensured the messages to be sent to the destination node efficiently and reliably against more selfness nodes.With a method of relation evaluation among nodes in social networks,the relation intensity matrix between the groups was fig-ured out.The source node chose proper member nodes as next intermediate node to forward the messages according to the relation intensity matrix,which avoided the messages to be sent to the selfness nodes and reduced the probability of dropping the messages.At the same time,due to intermittent connectivity of DTN,a method of identity-based cryptogra-phy was introduced during the process of messages forwarding,it ensured the security of messages forwarding.The ex-periments show that our method can ensure the security and efficiency of messages to the destination.…”
    Get full text
    Article
  8. 4348

    Anti-ransomware method based on active deception by CHEN Kai, MA Duohe, TANG Zhimin, DAI Jun

    Published 2024-07-01
    “…By combining static heuristic algorithms and dynamic heuristic algorithms to dynamically deploy deceptive files, a dynamic file security model based on active deception was established. …”
    Get full text
    Article
  9. 4349

    Global Information Management Model and Identification Method Based on Deep Reinforcement Learning by RuiLe Lan, XiJia He

    Published 2021-01-01
    “…The survey results show that 270 people put the focus of global information on the ecological environment, and about 30% of them attach great importance to the security of global information.…”
    Get full text
    Article
  10. 4350

    Research of STR multicast key management protocol based on bilinear pairing in ad hoc network by ZHOU Fu-cai1, XU Jian2, XU Hai-fang1, LIU Ze-chao1

    Published 2008-01-01
    “…STR multicast key management protocol has an optimal cost in computation,communication and storage.But on security property,STR cannot resist active attacks without providing key authentication.By introducing the bilinear pairing cryptosystem and the 3-ary key tree,the improved STR protocol which is called PSTR(bilinear pairing-based STR) was proposed.The key generation process and six basic sub-protocols were included in the protocol.Through proving the bilinear form of PSTR key tree,the security of the PSTR in computation was proved.Finally PSTR were compared with STR through performance analysis,the results of which show that: PSTR is more efficient than STR in the communication cost and the computation cost as well as the storage requirement.Therefore,PSTR is a novel,reliable group key management protocol,and is well-suited for Ad hoc networks.…”
    Get full text
    Article
  11. 4351

    EAEBHCM:an extended attribute encryption based hidden credentials model by Wei-jin GE, Xiao-hui HU

    Published 2012-12-01
    “…The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model.…”
    Get full text
    Article
  12. 4352

    Impossible statistical fault analysis of the PRIDE lightweight cryptosystem by Wei LI, Wenqian SUN, Dawu GU, Ailin ZHANG, Yunhua WEN

    Published 2024-01-01
    “…To analyze the implementation security of the PRIDE lightweight cryptosystem proposed at CRYPTO in 2014, a novel method of impossible statistical fault analysis on the ciphertext-only attack assumption was proposed.Furthermore, new distinguishers were designed, such as the Chi-square goodness-of-fit test-Hamming weight, and Chi-square goodness-of-fit test-maximum likelihood estimation.The proposed method had a random nibble-oriented fault model, and combined the statistical distribution states with the impossible relationship.On the difference among the intermediate states before and after the fault injections, at least 432 faults were required to recover the 128 bit secret key of PRIDE with a reliability of at least 99%.The experimental analysis demonstrates that the proposed method can not only reduce injected faults and latency, but also increase the accuracy.The results provide a vital reference for exploring the implementation security of lightweight cryptosystems.…”
    Get full text
    Article
  13. 4353

    Rule-defect oriented browser XSS filter test method by Zhijie GUI, Hui SHU

    Published 2018-11-01
    “…In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the implementation process of browser XSS filter.The formal definition,design test sample and scene generation algorithm were presented for browser XSS filter rule-defects.In order to quantitatively test and evaluate the filtering level of different browser XSS filters,combined with filtering success rate,false positive rate,input loss calculation filtering ability.Based on the proposed method,the prototype system is designed to automate the testing of several mainstream browser XSS filters,and the XSS filtering capabilities of different browsers are obtained.Further,after actual testing,the system also has the ability to discover undisclosed vulnerabilities.…”
    Get full text
    Article
  14. 4354

    Alternative feed resources in the era of climate change: A review by Taiwo K Ojediran, Olajide S Olofintuyi, Temitope J Ojediran

    Published 2024-09-01
    “…Climate change poses significant challenges to traditional feed resources, impacting livestock production and food security. In response, the search for alternative feed resources has gained momentum, aiming to enhance the resilience and sustainability of agriculture in a changing climate. …”
    Get full text
    Article
  15. 4355
  16. 4356

    A Middleware Applications Design for Health Information Sharing by Ketut Agus Seputra, A.A. Gede Yudhi Paramartha, Gede Aditra Pradnyana, Kadek Yota Ernanda Aryanto

    Published 2024-06-01
    “…However, integrating such systems, including the need for interoperability standards, data privacy, and security, is a highly challenging task, especially since patient rights in data access must be considered. …”
    Get full text
    Article
  17. 4357
  18. 4358

    Diagnosis of Protected Agriculture in Imbabura—Ecuador, Period 2016–2023 by Luis Marcelo Albuja-Illescas, Andrés Manolo Carrión-Burgos, Rafael Jiménez-Lao, María Teresa Lao

    Published 2025-01-01
    “…Among these, producer organization could be a viable strategy to address food security challenges in the context of climate change.…”
    Get full text
    Article
  19. 4359

    Moderate and Severe Level of Food Insecurity Is Associated with High Calorie-Dense Food Consumption of Filipino Households by Imelda Angeles-Agdeppa, Marvin B. Toledo, Jezreel Ann T. Zamora

    Published 2021-01-01
    “…The Household Food Insecurity Access Scale (HFIAS) was used to determine household food security status and the prevalence of food insecurity. …”
    Get full text
    Article
  20. 4360

    Legal Aspects of Telepathology by Christian Dierks

    Published 2000-01-01
    “…Data protection and data security are other crucial topics that require attention. …”
    Get full text
    Article