Showing 4,401 - 4,420 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 4401
  2. 4402

    Affective Evictions: by Anna Meera Gaonkar

    Published 2025-01-01
    “… The article suggests that government statements on anti-ghetto (2021) and security (2020) initiatives feature expressions of ‘white homesickness’ that manifest as longings for a national past and future with less or no migration to Denmark from outside Europe. …”
    Get full text
    Article
  3. 4403

    A bidirectional authentication protocol for RFID based on Syn by Shanhua ZHAN, Shaorong HUANG

    Published 2018-12-01
    “…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
    Get full text
    Article
  4. 4404
  5. 4405

    Scheme of virtual machine trusted migration in cloud environment by Jianbiao ZHANG, Yuanxi ZHU, Jun HU, Xiao WANG

    Published 2018-01-01
    “…With the rapid development of cloud computing,as an advantage of cloud services,virtual machine migration technology has been widely noticed and applied.However,there are some problems about VMs migration which should be solved,such as the complication of authentication of platform and the security issues of data transmission,etc.For these problems,firstly,the existing virtual machine migration scheme based on trusted computing technology was analyzed.Secondly,three secure needs that the virtual machine migration scheme which based on trusted computing technology should meet were proposed:the authenticated platform,confidentiality and integrity preserving transfer and atomicity of the vTPCM.Thirdly,a trusted migration scheme of virtual machines for cloud environment was proposed,in which the virtual machine central migration engine and trusted migration agent were introduced to solve the atomicity protection of vTPCM during the migration process.Finally,the concrete scheme was given with verification.…”
    Get full text
    Article
  6. 4406

    Rusya Federasyonu’nun Kafkasya Politikası: Bütüncül Bakış by Ahmet SAPMAZ

    Published 2022-12-01
    “…However, considering especially security policies of the RF, it is possible to see that the region is actually handled holistically. …”
    Get full text
    Article
  7. 4407

    Fixed features of future networks based on future applications by Yawen ZHANG, Miao WANG, Linghao WANG, Hanwen ZHANG, Yujun ZHANG

    Published 2019-08-01
    “…More and more network applications place higher demands on the network functions and performance.Internet of vehicles requires the network to support low latency and high reliability,telemedicine requires it with deterministic latency and security assurance,the industrial internet requires networks to meet large connections and high reliability,AR/VR applications require low latency and high bandwidth,quantum computing also brings new challenges to network security.Due to the limitations of its own architecture,existing IP networks only provide best-effort services that cannot meet the needs of future network applications.Future network applications in the next 20 years were investigated,the functional and performance of the future network were analyzed.By describing the application scenarios of internet of vehicles,telemedicine,industrial internet AR/VR and quantum computing,the network performance to meet the needs of these scenarios was analyzed and the performance indicators of future networks were obtained.…”
    Get full text
    Article
  8. 4408

    Retour sur la révolte du bassin minier. Les cinq leçons politiques d’un conflit social inédit by Larbi Chouikha, Vincent Geisser

    Published 2010-12-01
    “…In this sense, the social movement of the mining area is a source of “political instruction”, the review of which is useful to understand the degeneration of the security pact in place by the scheme during the previous decade.…”
    Get full text
    Article
  9. 4409

    Framework for a Cloud-Based Multimedia Surveillance System by M. Anwar Hossain

    Published 2014-05-01
    “…The paper finally reports that cloud-based multimedia surveillance system can effectively support the processing overload, storage requirements, ubiquitous access, security, and privacy in large-scale surveillance settings.…”
    Get full text
    Article
  10. 4410
  11. 4411

    A novel energy-aware trustworthy multi-hop routing model for Internet of things by Yichuan Wang, Yefei Zhang, Lei Zhu, Wenjiang Ji, Yanxiao Liu, Xinhong Hei

    Published 2018-12-01
    “…Due to different standards and communication stacks, traditional security mechanisms heavily rely on trust management to function well. …”
    Get full text
    Article
  12. 4412

    Optimization design and application of library face recognition access control system based on improved PCA. by Na Lin, Yan Ding, Yulei Tan

    Published 2025-01-01
    “…The application of face recognition technology in Library Access Control System (LACS) has an important impact on improving the security and management efficiency of the library. …”
    Get full text
    Article
  13. 4413

    Rapid Growth of the World Population and Its Socioeconomic Results by Rahim Sadigov

    Published 2022-01-01
    “…The main problem we raise in the study is the mismatch between the rapid growth of the world’s population and the socioeconomic security of the people. That is, if the issue of socioeconomic security is not resolved, the growth of the world’s population would be a global social problem.…”
    Get full text
    Article
  14. 4414

    Academic connotation and research trends of privacy computing by Fenghua LI, Hui LI, Ben NIU, Weidong QIU

    Published 2022-12-01
    “…The authors of this paper first proposed the concept, definition and academic connotation of privacy computing, and formed a relatively mature theoretical and technical system accordingly.In order to continuously promote the academic research and industrial application of privacy computing, the academic connotation of privacy computing was elaborated, including how to understand the full-life cycle, extended control, privacy quantification and mapping, desensitization effect evaluation.Besides, the necessity of iterative on-demand desensitization and the motivation to study the language of privacy computing were presented.The role of audit log self-storage in ubiquitous sharing was explained and some distorted academic concepts were also clarified.Moreover, 37 research points in 9 aspects of privacy computing and 40 research points in 8 aspects of data security were given.It helps to better understand the research scope of privacy computing and correctly distinguish between privacy computing and data security.…”
    Get full text
    Article
  15. 4415

    Current Experiences with Internet Telepathology and Possible Evolution in the Next Generation of Internet Services by V. Della Mea, C. A. Beltrami

    Published 2000-01-01
    “…Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth.…”
    Get full text
    Article
  16. 4416

    Hybrid Warfare Studies and Russia’s Example in Crimea by Mehmet Seyfettin EROL, Şafak OĞUZ

    Published 2015-12-01
    “…Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. …”
    Get full text
    Article
  17. 4417

    Research Developments in Generative Adversarial Networks for Image Restoration and Communication by Zhou Peng

    Published 2025-01-01
    “…The GAN model is also widely used in the field of communication and information security. It proposes an End-to-End(E-to-E) communication encryption system based on Deep Convolutional GAN (DCGAN) to solve the secure transmission problem in wireless communication systems based on E-to-E learning. …”
    Get full text
    Article
  18. 4418

    Mellem Skylla og Charybdis – træk af legalitetsprincippets historie i dansk strafferet by Morten Kjær

    Published 2017-02-01
    “…While the principle of legality was designed to secure the predictability of the criminal law, measures were also taken in order to secure flexibility in the application of the code by the courts. …”
    Get full text
    Article
  19. 4419

    Two-stage authentication and key agreement protocol for commuting in Internet of vehicles by ZHANG Haibo, YU Yi, WANG Dongyu, HE Xiaofan

    Published 2024-05-01
    “…Aiming at the security and efficiency of commuter vehicles accessing services from road side unit (RSU) in Internet of vehicles (IoV), a two-stage authentication and key agreement protocol was proposed. …”
    Get full text
    Article
  20. 4420

    Survey on key technologies of covert channel in ubiquitous network environment by Fenghua LI, Chaoyang LI, Chao GUO, Zifu LI, Liang FANG, Yunchuan GUO

    Published 2022-04-01
    “…In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The researches on covert channel in ubiquitous network environment were summarized and analyzed from three aspects of measurement, construction and detection.First, the typical covert channel metrics including the capacity, robustness, anti-detection, regularity and shape were summarized.Second, the construction technologies of covert channel were summarized and analyzed from six aspects of resource sharing, capacity, robustness, anti-detection, advantages and disadvantages in the first time.Third, the detection technologies of covert channel were compared and analyzed from five aspects of the type of covert channel, accuracy, whether it can be blind detection, the advantages and disadvantages.Finally, the development trends of covert channel were summarized and future research directions were prospected.…”
    Get full text
    Article