Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4441
Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics
Published 2024-09-01“…This system ensures efficient, secure and transparent data processing, optimizing the processes of data registration, authorization and verification. …”
Get full text
Article -
4442
Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks
Published 2017-03-01“…Due to the real-time requirement of message in vehicle ad hoc networks, it is a challenge to design an authentication for vehicle ad hoc networks to achieve security, efficiency, and conditional privacy-preserving. …”
Get full text
Article -
4443
Combined encryption method for CAN bus data based on periodic coupled processing
Published 2023-01-01“…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
Get full text
Article -
4444
Task scheduling algorithm for system-wide information management based on multiple QoS constraints
Published 2019-07-01“…An ant colony optimization task scheduling algorithm based on multiple quality of service constraint (QoS-ACO) for SWIM was proposed.Focusing on the multiple quality of service (QoS) requirements for task requests completed in system-wide information management (SWIM),considering the task execution time,security and reliability factors,a new evaluate user satisfaction utility function and system task scheduling model were constructed.Using the QoS total utility evaluation function of SWIM service scheduling to update the pheromone of the ant colony algorithm.The simulation results show that under the same conditions,the QoS-ACO algorithm is better than the traditional Min-Min algorithm and particle swarm optimization (PSO) algorithm in terms of task completion time,security,reliability and quality of service total utility evaluation value,and it can ensure that the user's task scheduling quality of service requirements are met,and can better complete the scheduling tasks of the SWIM.…”
Get full text
Article -
4445
Une alliance de circonstance : l’Italie et les musulmans d’Albanie (1912-1920)
Published 2017-06-01“…While its military intervention aimed at securing the Adriatic Sea, it draws Roma to claim protection over the Albanian Muslims in front of the competing powers in the Balkans. …”
Get full text
Article -
4446
Performance assessment approach based on change-point detection for network moving target defense
Published 2017-01-01“…A performance assessment approach based on change-point detection for network moving target defence was proposed.Directed to the problem of network resource graph not being able to present the effect of network resource vulnerabilities to network nodes,a conversion relationship between resource vulnerability changes and node security states was established by defining the concept of a hierarchical network resource graph and the efficiency of resource graph construction and updating were improved.Furthermore,directed to the problem of static detection algorithm not being able to precisely measure the dynamic change of network moving target defense,a change-point detection algorithm and standard degree measurement algorithm was designed.The security cost and benefit of network moving target defense in real-time and dynamically on the basis of unified metrics were defected and measured,which improved the evaluation accuracy.The analysis result of typical examples has proved the feasibility and the effectiveness of the proposed approach.…”
Get full text
Article -
4447
Blockchain based micropayment for e-health IOT sensors
Published 2023-09-01“…Increasing the use of this technology in smart cities requires improving the IT infrastructure for the security and privacy of users. This has led to the use of blockchain technology alongside the Internet of Things. …”
Get full text
Article -
4448
Staying in Marriage is Not Enough: Influence of Marital Commitment and Adult Attachment Style on Marital Flourishing
Published 2024-06-01“…The results showed that marital commitment (p = .000) and a secure attachment style (p = .000) significantly predict marital flourishing. …”
Get full text
Article -
4449
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01“…Boundary conditions for the security requirements are established and discussed as well as experimentally investigated for a specific setup based on printing and optical analysis of pigment‐carrier composites. …”
Get full text
Article -
4450
Coordination of natural and built infrastructure to better manage extreme events: a hydro-finance modeling framework
Published 2025-01-01“…Natural infrastructure offers a promising, soft-path solution to water security challenges; however, the scientific framework for siting and measuring the efficacy of such restoration projects is nascent. …”
Get full text
Article -
4451
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. …”
Get full text
Article -
4452
General Data Protection Law (LGPD) no. 13,709/2018: perception of accounting service providers
Published 2025-01-01“…Results: The results showed that accounting offices are prepared for the application of the General Data Protection Law, since they consider the consent of the holders essential for the processing of data, informing about the purpose of the data, thus complying with the principles established by law and adopting the necessary measures for data security. The survey revealed financial investment in training, data security systems and qualified professionals. …”
Get full text
Article -
4453
Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms
Published 2023-01-01“…This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages. …”
Get full text
Article -
4454
CPK-ECC based mutual authentication protocol for large-scale RFID system
Published 2017-08-01“…The existing RFID authentication protoco1s were short of sca1abi1ity.Taking advantage of combined pub1ic key(CPK),a CPK-ECC based authentication protoco1 was proposed considering the design demand of authentication protoco1s for 1arge-sca1e RFID system.The protoco1 imp1ements mutua1 and server1ess authentication by adoption of the e11iptic curve encryption scheme and the improved digita1 signature a1gorithm.Based on the security ana1ysis,the protoco1 can resist the existing security and privacy attacks effective1y.Compared with other ECC-based protoco1s,the server1ess protoco1 has better sca1abi1ity and performance,suitab1e for 1arge-sca1e RFID systems.…”
Get full text
Article -
4455
Research on optimal dispatch model of power grid considering the uncertainty of flexible resource demand response on the residential side
Published 2024-12-01“…However, there are uncertainties in the response willingness and response volume of residential customers, which have a non‐negligible impact on the security and economic dispatch of the power sector. …”
Get full text
Article -
4456
Developments in welfare of parent stock and commercial broilers
Published 2025-02-01“…Poultry meat is an important animal source food, and instrumental for global food security. The contribution that poultry breeding makes to meet current and future needs can be described in terms of a Code of Good Practice for Sustainable Breeding (Code-EFABAR®), and as Five Commitments to 1) Health, Food Safety and Food Security; 2) Diversity; 3) Balanced Breeding; 4) Management and Stockmanship; and 5) Transparency, Communication and Engagement. …”
Get full text
Article -
4457
Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia
Published 2023-06-01“…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
Get full text
Article -
4458
A Rare Complication of Tracheal Intubation: Tongue Perforation
Published 2012-01-01“…Laryngoscopy demonstrated the ETT to perforate the base of the tongue. The airway was secured with tracheostomy and the ETT was removed. …”
Get full text
Article -
4459
Authentication scheme for multi-cloud environment based on smart card
Published 2018-04-01“…To solve the problem of the access keys stored in a smart card increasing linearly with the number of registered clouds without third party participated in authentication,an authentication scheme was proposed for multi-cloud environment based on smart card.In the proposed scheme,the authentication was realized between user and multiple clouds without third party participation when the smart card only stored two access key.Thus the storage cost of smart card was reduced effectively.Because there was no public key cryptography,the authentication messages was generated by using XOR homomorphic function and Hash function,thus the computational cost of the smart card and the cloud servers was reduced effectively.Moreover,the proposed scheme also didn’t need to store any user’s information on the cloud servers,thereby reducing the storage and management costs of the cloud servers.The security analysis and the performance analysis show that the proposed scheme is able to resist multiple attacks,which is secure and efficient.…”
Get full text
Article -
4460
Evolution of Kenya’s Foreign Policy During the Cold War
Published 2024-02-01“…The study is premised on the need to elucidate if Kenya’s belief in regional peace and security was the cornerstone under which Kenya’s foreign was formulated and implemented. …”
Get full text
Article