Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
421
Cloud Security Certification Technology Based on Fingerprint Recognition
Published 2015-08-01Subjects: Get full text
Article -
422
Research on cloud storage systems supporting secure sharing
Published 2017-10-01“…A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.…”
Get full text
Article -
423
Survey of attack graph based network security metric
Published 2018-09-01Subjects: “…network security metric…”
Get full text
Article -
424
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01“…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
Get full text
Article -
425
Research on Intelligent Security Access Platform Based on SDN
Published 2023-09-01Subjects: Get full text
Article -
426
Economic Security in Border Areas: The Fulfillment of Community Welfare
Published 2024-10-01Subjects: “…economic security…”
Get full text
Article -
427
Explainable Security Requirements Classification Through Transformer Models
Published 2025-01-01“…Security and non-security requirements are two critical issues in software development. …”
Get full text
Article -
428
Technology and practice of intelligent governance for financial data security
Published 2023-06-01Subjects: “…financial data security…”
Get full text
Article -
429
Preliminary Study on the Security Domain Transformation of SMS Platform
Published 2013-08-01Subjects: Get full text
Article -
430
Secure topology protocol for mobile peer-to-peer networks
Published 2010-01-01Subjects: Get full text
Article -
431
Vaccinations for Hajj: Enhancing health and global health security
Published 2025-01-01Subjects: Get full text
Article -
432
Study and implementation of integrated network security monitoring system
Published 2003-01-01“…As the kernel of integrated network security and defense system, the prototype of NSMS has already been developed and tested, it is proved to be efficient, open and practical in network security monitoring.…”
Get full text
Article -
433
Secure federated distillation GAN for CIDS in industrial CPS
Published 2023-12-01“…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
Get full text
Article -
434
Analysis on the status and development of quantum secure communication standardization
Published 2018-01-01Subjects: Get full text
Article -
435
Secure and efficient two-party ECDSA signature scheme
Published 2021-02-01“…To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad Beaver’s triple, and utilizing the Beaver’s triple based secure two-party multiplication technology, some computationally intensive homomorphic encryption operations and oblivious transfer operations with high communication overhead were effectively avoided, and thereby an efficient two-party ECDSA signing was realized, which could ensure that the two signing parties output valid ECDSA signature without reconstructing the complete private key.The proposed scheme was proved to be provably secure under the hybrid model of the universally composable framework.Theoretical analysis and simulation results demonstrate that the proposed scheme has significant advantages in terms of signing efficiency and bandwidth requirements when compared with the existing two two-party ECDSA signature schemes.…”
Get full text
Article -
436
Construction of Information Security System of Power Generation Enterprise
Published 2014-01-01Subjects: Get full text
Article -
437
EU’s strategy and practice of 5G network security
Published 2020-06-01Subjects: Get full text
Article -
438
Secure Multicast Routing Algorithm for Wireless Mesh Networks
Published 2016-01-01“…Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. …”
Get full text
Article -
439
Residential Property Value and Security Features in Gated Communities
Published 2016-12-01Subjects: “…Gated community, Lagos, Nigeria, Residential property value, Security features, Willingness to pay…”
Get full text
Article -
440
Human resources development in farming and fisheries for food security
Published 2025-01-01“…The article delves into the issues of providing food security in the Maldives, a nation that regularly faces adverse weather conditions and natural disasters. …”
Get full text
Article