Showing 4,481 - 4,500 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 4481

    Utilizing Artificial neural networks (ANN) to regulate Smart cities for sustainable Urban Development and Safeguarding Citizen rights by Zhen Kuang, Junyu Su, Ahmad Latifian, Sanli Eshraghi, Alireza Ghafari

    Published 2024-12-01
    “…However, as cities become increasingly interconnected and data-dependent, concerns related to data privacy and security, as well as citizen participation and representation, have surfaced. …”
    Get full text
    Article
  2. 4482

    Activities of the Minister of Internal Affairs of the Ukrainian SSR Pavlo Yakovlevych Meshyk (1953) by V. A. Grechenko

    Published 2024-03-01
    “…At the same time, a policy was implemented to rid the state security agencies of their dependence on the influence of the Communist Party. …”
    Get full text
    Article
  3. 4483

    Driving force analysis and multi-scenario simulation of landscape ecological risk in the Jianghan Plain, China by Heng Liu, Lu Zhou, Diwei Tang

    Published 2025-01-01
    “…Abstract As a key food production base, land use changes in the Jianghan Plain (JHP) significantly affect the surface landscape structure and ecological risks, posing challenges to food security. Assessing the ecological risk of the JHP, identifying its drivers, and predicting the risk trends under different scenarios can provide strategic support for ecological risk management and safeguarding food security in the JHP. …”
    Get full text
    Article
  4. 4484
  5. 4485

    Experiences of south Asian key workers in COVID-19 lockdowns in the United Kingdom by Rizwana Yousaf, Tipu Sultan

    Published 2025-01-01
    “…Although currently coping with increased debts, economic burdens and long COVID symptoms, comprehensive job security and entitlement to secure contracts with provisions to sick leaves and pays should be made available to address economic vulnerabilities of south Asian key workers.…”
    Get full text
    Article
  6. 4486

    Acceptability of donor funding for clinical trials in the UK: a qualitative empirical ethics study using focus groups to elicit the views of research patient public involvement gro... by Simon Bowman, Heather Draper, Alexander Masters, Dominic Nutt, Kirstie Shearman

    Published 2022-06-01
    “…Existing governance processes will do some of this work, but additional REC guidance, particularly in relation to donors securing a place on the trial, may be necessary to help RECs navigate ethical concerns consistently.…”
    Get full text
    Article
  7. 4487

    Cross-Chain Identity Authentication Method Based on Relay Chain by Qipeng Huang, Minsheng Tan, Wenlong Tian

    Published 2025-01-01
    “…Therefore, our method demonstrates superior security and performance in cross-chain privacy protection.…”
    Get full text
    Article
  8. 4488

    Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain by Windra Swastika, Hermawan Wirasantosa, Oesman Hendra Kelana

    Published 2022-02-01
    “…Blockchain technology is technology that allows secure storage processes at a low cost. Security is guaranteed because everyone can take part in storing data with a distributed ledger. …”
    Get full text
    Article
  9. 4489

    The influence of service quality on the Aceh government SIGAP website by Irham Maulida, Ulung Pribadi

    Published 2023-12-01
    “…The influence of Responsiveness, Reliability, and Security on service quality has a positive but not significant effect. …”
    Get full text
    Article
  10. 4490

    Privacy-preserving attribute ticket scheme based on mobile terminal with smart card by Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG

    Published 2022-10-01
    “…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
    Get full text
    Article
  11. 4491

    Efficient revocable attribute-based encryption scheme by Xuejun LI, Dan ZHANG, Hui LI

    Published 2019-06-01
    “…In the existing solutions,the time-based scheme is difficult to achieve immediate revocation,and the third-party-based scheme often requires re-encryption,which needs large amount of calculation and doesn’t apply to mas-sive data.To solve the problem,an efficient and immediate CP-ABE scheme was proposed to support user and attribute lev-els revocation.The scheme was based on the classic LSSS access structure,introducing RSA key management mechanism and attribute authentication.By means of a semi-trusted third party,the user could be authenticated before decryption.Com-pared with the existing revocation schemes,The proposed scheme didn’t need the user to update the key or re-encrypt the ciphertext.The semi-trusted third party wasn’t required to update the RSA attribute authentication key.The scheme greatly reduced the amount of computation and traffic caused by revocation,while ensuring anti-collusion attacks and forward and backward security.Finally,the security analysis and experimental simulation show that the scheme has higher revocation ef-ficiency.…”
    Get full text
    Article
  12. 4492

    Le changement climatique et les propriétés du Conservatoire du littoral by Élodie Doze

    Published 2015-02-01
    “…Does it have to participate to the public security, by accepting to maintain sea defence buildings on its lands? …”
    Get full text
    Article
  13. 4493

    Construction of DDoS attacks malicious behavior knowledge base construction by Feiyang LIU, Kun LI, Fei SONG, Huachun ZHOU

    Published 2021-11-01
    “…Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed based on the knowledge graph, and contains two parts: a malicious traffic detection database and a network security knowledge base.The malicious traffic detection database detects and classifies malicious traffic caused by DDoS attacks, the network security knowledge base detects DDoS attacks from traffic characteristics and attack frameworks model malicious behaviors, and perform inference, tracing and feedback on malicious behaviors.On this basis, a distributed knowledge base was built based on the DDoS open threat signaling (DOTS) protocol to realize the functions of data transmission between distributed nodes, DDoS attack defense, and malicious traffic mitigation.The experimental results show that the DDoS attack malicious behavior knowledge base can effectively detect and mitigate the malicious traffic caused by DDoS attacks at multiple gateways, and has the knowledge update and reasoning function between the distributed knowledge bases, showing good scalability.…”
    Get full text
    Article
  14. 4494

    A blockchain sharding scheme in edge computing by Jun WANG, Jianwei MA, Jinxi LUO

    Published 2023-12-01
    “…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
    Get full text
    Article
  15. 4495

    A Color-Image Encryption Scheme Using a 2D Chaotic System and DNA Coding by Haidar Raad Shakir

    Published 2019-01-01
    “…This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid (DNA) sequence operations and the tangent-delay ellipse reflecting the cavity-map system (TD-ERCS). …”
    Get full text
    Article
  16. 4496

    EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs by Daniel Granlund, Christer Åhlund, Patrik Holmlund

    Published 2015-04-01
    “…Finally, the protocol was verified in terms of security using the AVISPA tool.…”
    Get full text
    Article
  17. 4497

    Adaptor signature scheme based on ISRSAC digital signature algorithm by Yanshuo ZHANG, Ning LIU, Yuqi YUAN, Yatao YANG

    Published 2023-03-01
    “…The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cryptosystem (ISRSAC).After proving that the proposed scheme satisfied the correctness of the pre-signature, unforgeability, adaptability of the pre-signature, extractability of the evidence and the security of the signature scheme, it was compared with the adapter signature scheme based on the SM2 digital signature algorithm, the Schnorr-based adapter signature scheme and the ECDSA-based adapter signature scheme.And these schemes were analyzed in terms of time overhead and main calculation amount.The analysis results show that the proposed scheme is similar to other schemes in terms of time overhead, but the proposed scheme expands the application scenarios of ISRSAC algorithm in the current environment, and through the combination of ISRSAC algorithm and adapter signature technology, the selection of adapter signature is more flexible and can have a wider range of applications.…”
    Get full text
    Article
  18. 4498

    Militarised Safety: Politics of Exclusion by Ayesha Sarfraz, Arsalan Rafique

    Published 2017-02-01
    “…This paper looks at urban space in the developing world as a dual site of the threat and the threatened while questioning the effectivity of security apparatus that have become the foundations for design of the contemporary city.…”
    Get full text
    Article
  19. 4499

    Intra-group mutual authentication key agreement protocol based on Chinese remainder theorem in VANET system by Haibo ZHANG, Zhou CHEN, Hongwu HUANG, Xiaofan HE

    Published 2022-01-01
    “…Aiming at the problem that vehicles in the vehicular ad-hoc network (VANET) system were vulnerable to malicious attacks when communicating with each other on the public network, a mutual authentication key agreement protocol in the VANET was proposed.A dynamic vehicle group was established by the Chinese remainder theorem to adapt to the rapid changes in the VANET topology.Signature information was used by both parties in communication to quickly authenticate the identity of the message sender, and key agreement was conduct through the semigroup of Chebyshev chaotic mapping.The pseudonym update and private key update mechanism were adopted to protect the privacy and security of the vehicle’s identity.The identities of malicious vehicles were tracked accurately by using signature information, and were revoked quickly by modifying the public key information.In addition, the semantic security of the protocol was proved by the BAN logic model.The simulation results show that the proposed protocol can effectively reduce the communication consumption and significantly reduce the computational consumption compared with the existing similar literature.…”
    Get full text
    Article
  20. 4500

    GENETİK OLARAK DEĞİŞTİRİLMİŞ ORGANİZMALARIN TARIMSAL ÜRETİMDE KULLANIMI, YÖNETİMİ VE AVRUPA BİRLİĞİNE UYUMLAŞTIRILMASI* ** by Oğuz Özdemir

    Published 2004-01-01
    “…ABSTRACTDevelopments ar isen in the period that has passed since the usage of GMO’s in agricultural production make it compulsory, the effective management o f these products in bio-security system.We deal in this article first, with ecological and socio-economical effects of GMO’s in the light ofresults from experimental works and predictions, second with the harmonisation of turkish regulations airmed to manage the merotioned risks within bio- security management to EU.GİRİŞSon yıllarda genetik ve moleküler biyolojide meydana gelen gelişmeler, organizmaların genetik yapılarının mühendislik uygulamalarıyla işlenebilmesi ve biçimlenebilmesini olanaklı hale getirmektedir. …”
    Get full text
    Article