Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4401
-
4402
Affective Evictions:
Published 2025-01-01“… The article suggests that government statements on anti-ghetto (2021) and security (2020) initiatives feature expressions of ‘white homesickness’ that manifest as longings for a national past and future with less or no migration to Denmark from outside Europe. …”
Get full text
Article -
4403
A bidirectional authentication protocol for RFID based on Syn
Published 2018-12-01“…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
Get full text
Article -
4404
Study on Soil Spring Model for Pipe and Silty Clay Interaction Based on Physical Model Test
Published 2021-01-01Get full text
Article -
4405
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01“…With the rapid development of cloud computing,as an advantage of cloud services,virtual machine migration technology has been widely noticed and applied.However,there are some problems about VMs migration which should be solved,such as the complication of authentication of platform and the security issues of data transmission,etc.For these problems,firstly,the existing virtual machine migration scheme based on trusted computing technology was analyzed.Secondly,three secure needs that the virtual machine migration scheme which based on trusted computing technology should meet were proposed:the authenticated platform,confidentiality and integrity preserving transfer and atomicity of the vTPCM.Thirdly,a trusted migration scheme of virtual machines for cloud environment was proposed,in which the virtual machine central migration engine and trusted migration agent were introduced to solve the atomicity protection of vTPCM during the migration process.Finally,the concrete scheme was given with verification.…”
Get full text
Article -
4406
Rusya Federasyonu’nun Kafkasya Politikası: Bütüncül Bakış
Published 2022-12-01“…However, considering especially security policies of the RF, it is possible to see that the region is actually handled holistically. …”
Get full text
Article -
4407
Fixed features of future networks based on future applications
Published 2019-08-01“…More and more network applications place higher demands on the network functions and performance.Internet of vehicles requires the network to support low latency and high reliability,telemedicine requires it with deterministic latency and security assurance,the industrial internet requires networks to meet large connections and high reliability,AR/VR applications require low latency and high bandwidth,quantum computing also brings new challenges to network security.Due to the limitations of its own architecture,existing IP networks only provide best-effort services that cannot meet the needs of future network applications.Future network applications in the next 20 years were investigated,the functional and performance of the future network were analyzed.By describing the application scenarios of internet of vehicles,telemedicine,industrial internet AR/VR and quantum computing,the network performance to meet the needs of these scenarios was analyzed and the performance indicators of future networks were obtained.…”
Get full text
Article -
4408
Retour sur la révolte du bassin minier. Les cinq leçons politiques d’un conflit social inédit
Published 2010-12-01“…In this sense, the social movement of the mining area is a source of “political instruction”, the review of which is useful to understand the degeneration of the security pact in place by the scheme during the previous decade.…”
Get full text
Article -
4409
Framework for a Cloud-Based Multimedia Surveillance System
Published 2014-05-01“…The paper finally reports that cloud-based multimedia surveillance system can effectively support the processing overload, storage requirements, ubiquitous access, security, and privacy in large-scale surveillance settings.…”
Get full text
Article -
4410
Inverse Projective Synchronization between Two Different Hyperchaotic Systems with Fractional Order
Published 2012-01-01Get full text
Article -
4411
A novel energy-aware trustworthy multi-hop routing model for Internet of things
Published 2018-12-01“…Due to different standards and communication stacks, traditional security mechanisms heavily rely on trust management to function well. …”
Get full text
Article -
4412
Optimization design and application of library face recognition access control system based on improved PCA.
Published 2025-01-01“…The application of face recognition technology in Library Access Control System (LACS) has an important impact on improving the security and management efficiency of the library. …”
Get full text
Article -
4413
Rapid Growth of the World Population and Its Socioeconomic Results
Published 2022-01-01“…The main problem we raise in the study is the mismatch between the rapid growth of the world’s population and the socioeconomic security of the people. That is, if the issue of socioeconomic security is not resolved, the growth of the world’s population would be a global social problem.…”
Get full text
Article -
4414
Academic connotation and research trends of privacy computing
Published 2022-12-01“…The authors of this paper first proposed the concept, definition and academic connotation of privacy computing, and formed a relatively mature theoretical and technical system accordingly.In order to continuously promote the academic research and industrial application of privacy computing, the academic connotation of privacy computing was elaborated, including how to understand the full-life cycle, extended control, privacy quantification and mapping, desensitization effect evaluation.Besides, the necessity of iterative on-demand desensitization and the motivation to study the language of privacy computing were presented.The role of audit log self-storage in ubiquitous sharing was explained and some distorted academic concepts were also clarified.Moreover, 37 research points in 9 aspects of privacy computing and 40 research points in 8 aspects of data security were given.It helps to better understand the research scope of privacy computing and correctly distinguish between privacy computing and data security.…”
Get full text
Article -
4415
Current Experiences with Internet Telepathology and Possible Evolution in the Next Generation of Internet Services
Published 2000-01-01“…Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth.…”
Get full text
Article -
4416
Hybrid Warfare Studies and Russia’s Example in Crimea
Published 2015-12-01“…Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. …”
Get full text
Article -
4417
Research Developments in Generative Adversarial Networks for Image Restoration and Communication
Published 2025-01-01“…The GAN model is also widely used in the field of communication and information security. It proposes an End-to-End(E-to-E) communication encryption system based on Deep Convolutional GAN (DCGAN) to solve the secure transmission problem in wireless communication systems based on E-to-E learning. …”
Get full text
Article -
4418
Mellem Skylla og Charybdis – træk af legalitetsprincippets historie i dansk strafferet
Published 2017-02-01“…While the principle of legality was designed to secure the predictability of the criminal law, measures were also taken in order to secure flexibility in the application of the code by the courts. …”
Get full text
Article -
4419
Two-stage authentication and key agreement protocol for commuting in Internet of vehicles
Published 2024-05-01“…Aiming at the security and efficiency of commuter vehicles accessing services from road side unit (RSU) in Internet of vehicles (IoV), a two-stage authentication and key agreement protocol was proposed. …”
Get full text
Article -
4420
Survey on key technologies of covert channel in ubiquitous network environment
Published 2022-04-01“…In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The researches on covert channel in ubiquitous network environment were summarized and analyzed from three aspects of measurement, construction and detection.First, the typical covert channel metrics including the capacity, robustness, anti-detection, regularity and shape were summarized.Second, the construction technologies of covert channel were summarized and analyzed from six aspects of resource sharing, capacity, robustness, anti-detection, advantages and disadvantages in the first time.Third, the detection technologies of covert channel were compared and analyzed from five aspects of the type of covert channel, accuracy, whether it can be blind detection, the advantages and disadvantages.Finally, the development trends of covert channel were summarized and future research directions were prospected.…”
Get full text
Article