Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4581
Testing the Strength of Chaotic Systems as Seeds in a Pseudo Random Bit Generator
Published 2025-01-01“…These observations can serve as guidelines for all future chaotic encryption algorithms, and chaos-based security-related applications in general.…”
Get full text
Article -
4582
Le paysage à l’épreuve des « nouveaux » défis de l’aménagement du territoire au Maroc : contraintes et perspectives
Published 2009-06-01“…The Moroccan regional planning was often marked by security concerns, based on historic inheritances of conflicting relations between central authority and tribes. …”
Get full text
Article -
4583
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01“…In the context of cyber warfare, Russia and the United States are trying to modernize their technology to secure their countries in the event of an attack from the opposing party. …”
Get full text
Article -
4584
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
Published 2015-06-01“…Then, the concept of secrecy cognitive gain is produced to highlight the effect of SR systems with secrecy on the whole networks security. Comparing with a single PR system, the SR system is beneficial to enhance the secrecy level for overlaid CRSNs. …”
Get full text
Article -
4585
Survey on network topology visualization
Published 2018-02-01“…As the basis of network monitoring,network management,and network security situation awareness,network topology visualization plays an underlying role in reflecting the whole state of the network and discovering the potential rules in the network topology.The basic content of network topology visualization was introduced and the main challenges in the research of network topology visualization were summarized from two aspects:the internal characteristics of network data and the point of the applied demand angle of the users.A top-down VPI model for network topology visualization and analysis drawing from the experience of domain experts by analyzing and understanding the nodes and connection status of network topology,having an insight into the potential laws of topological information like performance bottleneck,network security,time-varying characteristics and so on.This model includes vision,procedure,and interaction.According to the VPI model,visualization methods based on perception enhance were summarized from three aspects:enhancement of visual perception,enhancement of time-varied procedure and enhancement of exploratory interaction.Finally,future development trend of those topics were discussed combined with application demand.…”
Get full text
Article -
4586
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01“…A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the method of block classification to lower the requirement for storage capacity of the sender.A new quantum source as transmission carrier was introduced and simply encoding and decoding rules were designed based on the laws of quantum non-cloning and ciphertext indistinguishability.On the other hand,classical one-time pad technique is used to ensure the security of quantum key and plaintext in the transmission channel.At the same time,select different updating strategy of quantum public-key according to the results of error detection which can significantly reduce key consumption.Compared with the previous quantum public-key encryption based on entangled states and single-photon,there are no entangled states and decoyed particles are needed,so it is not only efficient to reduce the overhead of communication traffic between legitimate users,but also easier to carry out in practice.The analysis shows that the proposed scheme is secure.…”
Get full text
Article -
4587
HD-SEIRS Malware Propagation Model in Heterogeneous Complex Networks
Published 2024-12-01“…With the widespread use of the Internet, the Web, and online social networks, the number of vulnerabilities and security threats has increased significantly. Various types of malwares (worms and viruses) have become a major threat to the security of systems and networks. …”
Get full text
Article -
4588
Environmental impacts of restructuring the EU’s natural gas supply and consumption: Learnings from the 2022 energy crisis
Published 2025-01-01“…Summary: In 2022, the European Union put forward the REPowerEU plan in response to Russia’s invasion of Ukraine, aiming at enhancing short-term energy security by diversifying imports and reducing natural gas demand while accelerating the deployment of renewable alternatives in the long term. …”
Get full text
Article -
4589
Medical Image Encryption and Decryption Based on DNA: A Survey
Published 2023-09-01“…If DNA is employed appropriately, it can be used to achieve a number of security technologies, including encryption, steganography, signature, and authentication through the use of DNA molecules as information carriers. …”
Get full text
Article -
4590
Chaotic Motions in the Real Fuzzy Electronic Circuits
Published 2013-01-01“…In the research field of secure communications, the original source should be blended with other complex signals. …”
Get full text
Article -
4591
Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture
Published 2023-04-01“…In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was proposed.A novel block structure BM-Tree was designed for vehicle platoon identity authentication, which provided support for efficient cross trust-domain group authentication by sharing the group authentication parame-ters on the blockchain.Dynamic pseudonym was used for vehicle identity privacy-preserving and bilinear mapping was used to transform the trust-domain parameters, which realized cross trust-domain group authentication with conditional privacy.An efficient group authentication protocol based on BM-Tree was proposed, which realized batch identity au-thentication and re-authentication of vehicle platoon.The proposed scheme has better performance than existing cross trust-domain authentication methods in terms of security and computational overhead.Experimental result shows that the authentication delay is reduced by 29%, 25% and 53% on average, respectively compared with BLA, MDPA and BBA.…”
Get full text
Article -
4592
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
Published 2024-03-01“…Even if an attacker has enough background knowledge, the security of the electricity information of one another can be ensured.…”
Get full text
Article -
4593
A Critique on “Economic Threats and Resistance Economy”
Published 2017-07-01“…It is necessary to pay more attention to requirements and consistency of resistance economy patterns, comprehensive defense, and security pattern and its role in resistance economy. …”
Get full text
Article -
4594
Quantification of nipple size and shape among an ethnically diverse sample of US women
Published 2023-09-01“…Viable data were secured from 78% of the scans undertaken, yielding 538 datasets from 329 participants. …”
Get full text
Article -
4595
Date Attachable Offline Electronic Cash Scheme
Published 2014-01-01“…Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.…”
Get full text
Article -
4596
Ranking the Return on Assets of Tehran Stock Exchange by a New Method Based on Z-Numbers Data
Published 2023-01-01“…The advantage of this method over conventional fuzzy methods is considering uncertainty and allocating credit in the opinion of experts to estimate fuzzy parameters, and in the second example, we ranked the factors which affect the productivity of tourism security. Then, by using the proposed algorithm, we introduce the most important and the least important factors for tourist security budgeting.…”
Get full text
Article -
4597
Modernization of the Chinese People’s Liberation Army
Published 2024-08-01“…Until recently, China’s national security was primarily associated with the economic development of the country and national economy systemic modernization. …”
Get full text
Article -
4598
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics
Published 2013-01-01“…We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. …”
Get full text
Article -
4599
Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition
Published 2018-01-01“…Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. Effective prediction of the behavior not only facilitates the understanding of the dynamics of organizational behaviors but also supports homeland security’s missions in prevention, preparedness, and response to terrorist acts. …”
Get full text
Article -
4600
Efficient information exchange approach for medical IoT based on AI and DAG-enabled blockchain
Published 2025-01-01“…The development of artificial intelligence (AI) based medical Internet of Things (IoT) technology plays a crucial role in making the collection and exchange of medical information more convenient. However, security, privacy, and efficiency issues during information exchange have become pressing challenges. …”
Get full text
Article