Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4421
Data management based on blockchain and edge computing for Internet of things
Published 2020-06-01“…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
Get full text
Article -
4422
Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback
Published 2022-02-01“…Aiming at the security problem of edge server, a trust evaluation algorithm was proposed, which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction, a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers, and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction, the highly trusted device node was selected to calculate the feedback trust, which overcame the malicious feedback of the traditional mechanism.When calculating the global trust, the expected score of the server and the adaptive weight calculation method were considered, which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity, and can effectively resist the attack of malicious nodes.…”
Get full text
Article -
4423
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01“…Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature (CBS) algorithm was proposed,and the security of the proposed CBS scheme was proved.The verification result of the signature in the algorithm was constant,which ensured the anonymity of the authentication entities in the cross-domain process.The algorithm does not contain pairing,and avoids complex certificate management in traditional PKI and the key escrow and distribution of IBS.Then a cross-domain authentication scheme for mobile devices was constructed by combining the proposed signature algorithm.The scheme ensures the anonymity of authentication at the same time.Finally,compared with other schemes,the scheme proposed is more secure and has less computation cost and communication cost.Moreover,the scheme is simple and efficient,and could be applied to the cross-domain authentication of mobile devices.…”
Get full text
Article -
4424
Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature
Published 2024-11-01“…Furthermore, the proposed scheme deployed the sanitizability function on road-side units (RSU) and proposed an efficient pseudonym certificate distribution scheme. Security analysis shows that the scheme effectively resists correlation and impersonation attacks, with minimal computational overhead on RSU and vehicles, ensuring good efficiency and security during pseudonym certificate and anonymous authentication processes.…”
Get full text
Article -
4425
Parallel remote state preparation for fully device-independent verifiable blind quantum computation
Published 2025-01-01“…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. …”
Get full text
Article -
4426
Vulnerability Analysis of CSP Based on Stochastic Game Theory
Published 2016-01-01Get full text
Article -
4427
The Construction of the Evaluation Index for the Outgoing Auditing of the Natural Resource Assets of Local Leading Cadres Based on the Analytic Hierarchy Process
Published 2022-01-01“…As the foundation of human survival and development, natural resources affect every aspect of our lives, including life and health, financial security, and overall social security. This article describes building a system for valuing the assets of good NR in operation for local executives who employ analytic hierarchy process. …”
Get full text
Article -
4428
Walkshop ‘Nuclear risks and long-term peacekeeping’: 26.06.2025 – 01.07.2025
Published 2024-12-01“… Since 2021, the FRFG has organised Walkshops on the topics social security and intergenerational contracts, atomic waste, the coal phase-out, and climate change. …”
Get full text
Article -
4429
Leveraging Cloud Technology for Personalized Multiple Sclerosis Care: A Comprehensive Data Management and Visualization Approach
Published 2024-11-01“… This project develops a cloud-based solution for securely managing clinical data and patient-reported outcomes (PROMs) for multiple sclerosis (MS) patients. …”
Get full text
Article -
4430
Aligning policy for success in developing countries: evidence from the poultry sector of Ghana
Published 2025-02-01“…Specifically, our study emphasizes the importance of striking a balance between fostering domestic production and ensuring food security.…”
Get full text
Article -
4431
A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0
Published 2024-03-01“…Cyber security issues have become a complex challenge for companies that obligating to Industry 4.0 paradigm. …”
Get full text
Article -
4432
Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia
Published 2023-06-01“…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
Get full text
Article -
4433
A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things
Published 2025-01-01“…The findings suggest that blockchain technology not only improves data security and trustworthiness but also opens new avenues for efficient and transparent management in agriculture and animal husbandry.…”
Get full text
Article -
4434
Explaining the Role of Geopolitical Components Affecting spatial planning of border regions (Case Study: West Azarbaijan Province)
Published 2022-06-01“…Therefore, according to the findings of the research, it is suggested that security and security measures are implemented with economic, political, and socio-cultural approaches.…”
Get full text
Article -
4435
Circuit Implementation, Synchronization of Multistability, and Image Encryption of a Four-Wing Memristive Chaotic System
Published 2018-01-01“…The four-wing memristive chaotic system used in synchronization is applied to secure communication which can increase the difficulty of deciphering effectively and enhance the security of information. …”
Get full text
Article -
4436
Blockchain-based renewable energy certificate system in Indonesia
Published 2025-02-01“…Results show that blockchain technology can revolutionize Indonesian REC market by improving security, traceability, and promote stakeholders' trust. …”
Get full text
Article -
4437
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
Get full text
Article -
4438
Policing wildlife trafficking in northeastern Mexico: the case of Tamaulipas in 2023-2024
Published 2025-01-01“…Illegal wildlife trade is an environmental, economic, and social problem that threatens global public health and the security of countries. It is one of the main drivers of biodiversity loss on a global scale. …”
Get full text
Article -
4439
Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures
Published 2025-01-01“…The suggested framework strengthens smart grid immunity to cyber threats such as DoS attacks, back door injections, and adversarial perturbations while increasing energy distribution stability and security. For enhancing smart grid security, our results emphasize the importance of integration of ML and DL techniques and provide such an understanding of threat environment for future research and development on threat identification.…”
Get full text
Article -
4440
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01“…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
Get full text
Article