Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4561
ON THE QUESTION OF MODERNIZATION AND CREATION OF FORGING AND THERMAL EQUIPMENT OF THE NEW GENERATION
Published 2015-11-01“…Three fundamental principles of modern production: Saving resources; Environmental cleanliness; Security. During the reconstruction, re-equipment, modernization and creation of a new thermal equipment, it is necessary to choose units and technologies that provide greater efficiency and higher efficiency equipment, strict compliance with environmental and safety standards.…”
Get full text
Article -
4562
Cost accounting for environmental safety
Published 2016-04-01“…The article describes the main approaches to cost accounting for environmental security, the analysis of methods of cost accounting, proposals for the organization of accounting for the item "Environmental protection measures", systematizing the cost of measures for environmental protection aimed at co-storage and restoration of natural environment, rational use and vosproizvel of natural resources…”
Get full text
Article -
4563
Mobile Internet Trends in 4G Era
Published 2014-05-01“…An introduction of the mobile internet trends was given on several aspects such as technology, business, industry, social culture and security.…”
Get full text
Article -
4564
Discussion on Artificial Intelligence Safety and Ethical Issues
Published 2025-01-01“…This article explores the development of artificial intelligence technology and its potential safety and ethical challenges in various fields. In terms of security, the risk of adversarial attacks is analyzed in depth, and the robustness of the model is enhanced through adversarial training and data enhancement techniques. …”
Get full text
Article -
4565
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01“…In order to guarantee the users’ privacy in the process of making friends in the mobile social networks,a new scheme of proxy re-encryption privacy protection in the cross-domain environment was introduced.The scheme employed the cross-domain multi-authority to sharing secret keys,so as to realize the access and shave of the cross-domain users data.And the secret keys of users’ attributes were re-encrypted,based on the technology of the proxy re-encryption and attribute encryption,to achieve the friends matching under the conditions of extending the access policy.Meanwhile,in purpose of enhancing the privacy of users’ data,the technology which contained the separation of users’ privacy ciphertext and secret keys was adopted.Based on that,problems in the existing system such as user data’s inability to be shared cross-cloud,less matching during the process of making friends and users’ inability to make friends when offline had been addressed.Security and experimental analysis show that this scheme can achieve chosen plaintext attack (CPA) security,ensure the privacy of friend discovery,and that is more effective than existing solutions.…”
Get full text
Article -
4566
ASSESSMENT OF THE LEVEL OF SAFETY AND HEALTH AT WORK OF THE 400/220/110/20 kV MINTIA POWER SUBSTATION
Published 2023-12-01“…The development of theory and applications in the field of systems security has provided a scientific basis and useful tools for the work of preventing professional risks. …”
Get full text
Article -
4567
Scan it - get it: A study on the socio-demographic characteristics of consumers using qr codes
Published 2024-12-01“…It is imperative to develop security measures, conduct awareness studies, and enhance consumers' perceptions of trust in QR codes to facilitate the widespread acceptance of QR codes.…”
Get full text
Article -
4568
The real-time data processing framework for blockchain and edge computing
Published 2025-05-01“…However, traditional centralized methods struggle with real-time requirements and data security. This paper introduces VCD-TSNet, a novel real-time IoT data processing framework that combines blockchain and edge computing. …”
Get full text
Article -
4569
Kelekatan dan Kesejahteraan Psikologis Anak dan Remaja: Studi Meta-Analisis
Published 2021-01-01“…The results show that (1) the correlation effect between secure attachment and positive psychological well-being was significant; (2) the correlation effect of secure attachment with negative psychological well-being indicates a significant value; (3) the correlation effect between avoidance and positive psychological well-being was significant; (4) the correlation effect between avoidance and negative psychological well-being was significant; (5) the correlation effect between anxious and positive psychological well-being was not significant; (6) the correlation effect between anxious and negative psychological well-being was significant; (7) the correlation effect between disorganized with positive psychological well-being was significant; (8) the correlation effect between disorganized and negative psychological well-being was significant. …”
Get full text
Article -
4570
Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration
Published 2022-05-01“…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
Get full text
Article -
4571
Dataset of digital literacy of university students in Indonesia
Published 2025-02-01“…Data were measured using a digital literacy scale consisting of six subscales: technological skill, personal security skill, critical skill, device security skill, informational skill, and communication skill. …”
Get full text
Article -
4572
Effective deterrence: When is deterrence the "right" strategy for achieving national interests?
Published 2023-01-01“…The research goal of this paper is to determine the circumstances in which the strategy of deterrence is the "right thingˮ for the security of the state. In the pursuit of realizing their own interests - from minimum survival to maximum hegemony, states (in theory) have a wide range of possible ideal-type strategies. …”
Get full text
Article -
4573
Research on VPN service for government and enterprise customers in SDN-based vCPE networks
Published 2017-03-01“…In addition, fused schemes were proposed to combine the advantages in security, transmission rate and QoS, so that government and enterprise customers can select flexible VPN products according to their own needs in bandwidth, security, delay and others.…”
Get full text
Article -
4574
Statistical Comparison of piracy and armed robbery with emphasis on the South China Sea - Malacca Strait and the Persian Gulf - Strait of Hormuz
Published 2019-12-01“…This research allowed us: 1) to make a distinction between the security in two aforementioned areas; 2) to represent the source of the information for researchers.…”
Get full text
Article -
4575
Redactable blockchain supporting trapdoor revocation and limited number of redactions
Published 2023-07-01“…Aiming at the problem that although the existing redactable blockchain schemes that support trapdoor revocation could revoke the redaction permissions of trapdoor holders, but they were unable to limit the number of redactions using trapdoors, indicating an issue where the management of editing permissions was not adequately refined, a revocable chameleon hash with limited number of redactions was proposed, based on which a new redactable blockchain scheme was proposed.Specifically, the proposed scheme included a master trapdoor, a subordinate trapdoor, and the generated witness.The subordinate trapdoor was deployed for data modification, while the master trapdoor was employed to revoke the subordinate trapdoor, thus accomplishing the objective of revoking editing permissions.Meanwhile, the witness was developed to strictly limit the number of edits via the subordinate trapdoor to one time.The proposed scheme is proved to be secure under the standard complexity assumptions.Theoretical analysis and simulation experiments indicate that the proposed scheme has advantages in terms of security guarantee, when compared with the existing schemes supporting trapdoor revocation.At the same time it introduces little additional computation overhead, and thus has certain practicality.…”
Get full text
Article -
4576
Ureteric Injury due to the Use of LigaSure
Published 2013-01-01“…The use of LigaSure has made securing haemostasis and tissue dissection relatively easy especially in laparoscopic surgery; however, if not used with care it can cause damage to the surrounding structures through lateral spread of energy. …”
Get full text
Article -
4577
An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
Published 2021-01-01“…Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.…”
Get full text
Article -
4578
An Optimal Routing Framework for an Integrated Urban Power–Gas–Traffic Network
Published 2024-01-01“…The developed non-probabilistic framework provides decision-makers with various secure options to avoid worst-case scenarios and promote social and environmental benefits. …”
Get full text
Article -
4579
Approach of location privacy protection based on order preserving encryption of the grid
Published 2017-07-01“…The centralized structure of the trusted third party is a major privacy protection structure on location based services.However,if the central third party server can not be trusted or compromised,users have the risk of leakage of privacy location.Aiming at the above problems,location privacy protection approach based on a user-defined grid to hide location was proposed.The system first automatically converted the query area into a user-defined grid,and then the approach utilized order preserving encryption,which made the user’s real-time position in the hidden state could still be compared.Because the information in the process of the approach was in a state of encryption,the server could not know the user’s location information,thus improved privacy protection of the user location.The central third party server only need to do simple comparison work,so its processing time overhead would effectively decrease.Security analysis certificate the security of the proposed approach and simulation experimental show the proposed approach can reduce the time cost of the central third party server.…”
Get full text
Article -
4580
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
Published 2025-01-01“…However, this shift introduces critical security and privacy risks, as sensitive patient information is stored on untrusted third-party servers. …”
Get full text
Article