Showing 4,441 - 4,460 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4441

    Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics by U. A. Vishniakou, YiWei Xia, Chuyue Yu

    Published 2024-09-01
    “…This system ensures efficient, secure and transparent data processing, optimizing the processes of data registration, authorization and verification. …”
    Get full text
    Article
  2. 4442

    Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks by Libing Wu, Jing Fan, Yong Xie, Jing Wang, Qin Liu

    Published 2017-03-01
    “…Due to the real-time requirement of message in vehicle ad hoc networks, it is a challenge to design an authentication for vehicle ad hoc networks to achieve security, efficiency, and conditional privacy-preserving. …”
    Get full text
    Article
  3. 4443

    Combined encryption method for CAN bus data based on periodic coupled processing by Wutao QIN, Peng WANG, Yufeng LI

    Published 2023-01-01
    “…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
    Get full text
    Article
  4. 4444

    Task scheduling algorithm for system-wide information management based on multiple QoS constraints by Gang LI, Zhijun WU

    Published 2019-07-01
    “…An ant colony optimization task scheduling algorithm based on multiple quality of service constraint (QoS-ACO) for SWIM was proposed.Focusing on the multiple quality of service (QoS) requirements for task requests completed in system-wide information management (SWIM),considering the task execution time,security and reliability factors,a new evaluate user satisfaction utility function and system task scheduling model were constructed.Using the QoS total utility evaluation function of SWIM service scheduling to update the pheromone of the ant colony algorithm.The simulation results show that under the same conditions,the QoS-ACO algorithm is better than the traditional Min-Min algorithm and particle swarm optimization (PSO) algorithm in terms of task completion time,security,reliability and quality of service total utility evaluation value,and it can ensure that the user's task scheduling quality of service requirements are met,and can better complete the scheduling tasks of the SWIM.…”
    Get full text
    Article
  5. 4445

    Une alliance de circonstance : l’Italie et les musulmans d’Albanie (1912-1920) by Renaud Dorlhiac, Fabrice Jesné

    Published 2017-06-01
    “…While its military intervention aimed at securing the Adriatic Sea, it draws Roma to claim protection over the Albanian Muslims in front of the competing powers in the Balkans. …”
    Get full text
    Article
  6. 4446

    Performance assessment approach based on change-point detection for network moving target defense by Cheng LEI, Duo-he MA, Hong-qi ZHANG, Ying-jie YANG, Miao WANG

    Published 2017-01-01
    “…A performance assessment approach based on change-point detection for network moving target defence was proposed.Directed to the problem of network resource graph not being able to present the effect of network resource vulnerabilities to network nodes,a conversion relationship between resource vulnerability changes and node security states was established by defining the concept of a hierarchical network resource graph and the efficiency of resource graph construction and updating were improved.Furthermore,directed to the problem of static detection algorithm not being able to precisely measure the dynamic change of network moving target defense,a change-point detection algorithm and standard degree measurement algorithm was designed.The security cost and benefit of network moving target defense in real-time and dynamically on the basis of unified metrics were defected and measured,which improved the evaluation accuracy.The analysis result of typical examples has proved the feasibility and the effectiveness of the proposed approach.…”
    Get full text
    Article
  7. 4447

    Blockchain based micropayment for e-health IOT sensors by Mahdi Shahraki, Amir Jalali Bighdeli

    Published 2023-09-01
    “…Increasing the use of this technology in smart cities requires improving the IT infrastructure for the security and privacy of users. This has led to the use of blockchain technology alongside the Internet of Things. …”
    Get full text
    Article
  8. 4448

    Staying in Marriage is Not Enough: Influence of Marital Commitment and Adult Attachment Style on Marital Flourishing by Sri Juwita Kusumawardhani, Anggi Mayangsari, Reny Rustyawati, Ilham Phalosa Reswara

    Published 2024-06-01
    “…The results showed that marital commitment (p = .000) and a secure attachment style (p = .000) significantly predict marital flourishing. …”
    Get full text
    Article
  9. 4449

    Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work by Marvin Winkler, Catharina Peither, Simon Petrick, Lothar Seidemann, Holger Jelich, Frank Kleine Jäger, Jörn Müller‐Quade, Alexander Colsmann, Hermann Nirschl, Frank Rhein

    Published 2025-02-01
    “…Boundary conditions for the security requirements are established and discussed as well as experimentally investigated for a specific setup based on printing and optical analysis of pigment‐carrier composites. …”
    Get full text
    Article
  10. 4450

    Coordination of natural and built infrastructure to better manage extreme events: a hydro-finance modeling framework by Hongkai Gao, Reepal Dinesh Shah, Dai Yamazaki, Theodore J Bohn, Glen Low, John Louis Sabo

    Published 2025-01-01
    “…Natural infrastructure offers a promising, soft-path solution to water security challenges; however, the scientific framework for siting and measuring the efficacy of such restoration projects is nascent. …”
    Get full text
    Article
  11. 4451

    FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review by Abdulmajeed Adil Yazdeen, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, Rizgar R. Zebari

    Published 2021-03-01
    “…The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. …”
    Get full text
    Article
  12. 4452

    General Data Protection Law (LGPD) no. 13,709/2018: perception of accounting service providers by Gabriella Aline Sampaio da Silva, Graziele Oliveira Aragão Servilha, Josiane Silva Costa dos Santos, Sonia Aparecida Beato Ximenes de Melo

    Published 2025-01-01
    “…Results: The results showed that accounting offices are prepared for the application of the General Data Protection Law, since they consider the consent of the holders essential for the processing of data, informing about the purpose of the data, thus complying with the principles established by law and adopting the necessary measures for data security. The survey revealed financial investment in training, data security systems and qualified professionals. …”
    Get full text
    Article
  13. 4453

    Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms by Lei Wang, Ying Yuan, Yan Ding

    Published 2023-01-01
    “…This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages. …”
    Get full text
    Article
  14. 4454

    CPK-ECC based mutual authentication protocol for large-scale RFID system by Yao-min PAN, Zheng SHAN, Qing DAI, Feng YUE

    Published 2017-08-01
    “…The existing RFID authentication protoco1s were short of sca1abi1ity.Taking advantage of combined pub1ic key(CPK),a CPK-ECC based authentication protoco1 was proposed considering the design demand of authentication protoco1s for 1arge-sca1e RFID system.The protoco1 imp1ements mutua1 and server1ess authentication by adoption of the e11iptic curve encryption scheme and the improved digita1 signature a1gorithm.Based on the security ana1ysis,the protoco1 can resist the existing security and privacy attacks effective1y.Compared with other ECC-based protoco1s,the server1ess protoco1 has better sca1abi1ity and performance,suitab1e for 1arge-sca1e RFID systems.…”
    Get full text
    Article
  15. 4455

    Research on optimal dispatch model of power grid considering the uncertainty of flexible resource demand response on the residential side by Guili Ding, Zhan Shu, Jianbo Xin, Zhenzhi Lin, Zhiqiang Zhong, Shiyang Zhou, Qingzhao Ji, Hui Xiao, Xin Han

    Published 2024-12-01
    “…However, there are uncertainties in the response willingness and response volume of residential customers, which have a non‐negligible impact on the security and economic dispatch of the power sector. …”
    Get full text
    Article
  16. 4456

    Developments in welfare of parent stock and commercial broilers by Tim Burnside, Anne-Marie Neeteson

    Published 2025-02-01
    “…Poultry meat is an important animal source food, and instrumental for global food security. The contribution that poultry breeding makes to meet current and future needs can be described in terms of a Code of Good Practice for Sustainable Breeding (Code-EFABAR®), and as Five Commitments to 1) Health, Food Safety and Food Security; 2) Diversity; 3) Balanced Breeding; 4) Management and Stockmanship; and 5) Transparency, Communication and Engagement. …”
    Get full text
    Article
  17. 4457

    Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia by Genet Gelana Kabeta, S G Pretorius

    Published 2023-06-01
    “…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
    Get full text
    Article
  18. 4458

    A Rare Complication of Tracheal Intubation: Tongue Perforation by Loreto Lollo, Tanya K. Meyer, Andreas Grabinsky

    Published 2012-01-01
    “…Laryngoscopy demonstrated the ETT to perforate the base of the tongue. The airway was secured with tracheostomy and the ETT was removed. …”
    Get full text
    Article
  19. 4459

    Authentication scheme for multi-cloud environment based on smart card by Sen ZHAO, Qingqing GAN, Xiaoming WANG, Fang YU

    Published 2018-04-01
    “…To solve the problem of the access keys stored in a smart card increasing linearly with the number of registered clouds without third party participated in authentication,an authentication scheme was proposed for multi-cloud environment based on smart card.In the proposed scheme,the authentication was realized between user and multiple clouds without third party participation when the smart card only stored two access key.Thus the storage cost of smart card was reduced effectively.Because there was no public key cryptography,the authentication messages was generated by using XOR homomorphic function and Hash function,thus the computational cost of the smart card and the cloud servers was reduced effectively.Moreover,the proposed scheme also didn’t need to store any user’s information on the cloud servers,thereby reducing the storage and management costs of the cloud servers.The security analysis and the performance analysis show that the proposed scheme is able to resist multiple attacks,which is secure and efficient.…”
    Get full text
    Article
  20. 4460

    Evolution of Kenya’s Foreign Policy During the Cold War by Danvas Mabeya

    Published 2024-02-01
    “…The study is premised on the need to elucidate if Kenya’s belief in regional peace and security was the cornerstone under which Kenya’s foreign was formulated and implemented. …”
    Get full text
    Article