Showing 4,581 - 4,600 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4581

    Testing the Strength of Chaotic Systems as Seeds in a Pseudo Random Bit Generator by Lazaros Moysis, Marcin Lawnik, Christos Volos, Murilo S. Baptista, Sotirios K. Goudos, George F. Fragulis

    Published 2025-01-01
    “…These observations can serve as guidelines for all future chaotic encryption algorithms, and chaos-based security-related applications in general.…”
    Get full text
    Article
  2. 4582

    Le paysage à l’épreuve des « nouveaux » défis de l’aménagement du territoire au Maroc : contraintes et perspectives by Mustapha El Hannani, Aude Nuscia Taïbi, Yahia El Khalki, Abdelhalim Benyoucef

    Published 2009-06-01
    “…The Moroccan regional planning was often marked by security concerns, based on historic inheritances of conflicting relations between central authority and tribes. …”
    Get full text
    Article
  3. 4583

    Russia vs America cyber war: space technology mastery competition by Fadra Fadra, Joseph Teguh Santoso

    Published 2024-10-01
    “…In the context of cyber warfare, Russia and the United States are trying to modernize their technology to secure their countries in the event of an attack from the opposing party. …”
    Get full text
    Article
  4. 4584

    Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint by Hongyu Ma, Kai Niu, Weiling Wu, Shengyu Li, Guangqian Chu

    Published 2015-06-01
    “…Then, the concept of secrecy cognitive gain is produced to highlight the effect of SR systems with secrecy on the whole networks security. Comparing with a single PR system, the SR system is beneficial to enhance the secrecy level for overlaid CRSNs. …”
    Get full text
    Article
  5. 4585

    Survey on network topology visualization by Song WANG, Ye ZHANG, Yadong WU

    Published 2018-02-01
    “…As the basis of network monitoring,network management,and network security situation awareness,network topology visualization plays an underlying role in reflecting the whole state of the network and discovering the potential rules in the network topology.The basic content of network topology visualization was introduced and the main challenges in the research of network topology visualization were summarized from two aspects:the internal characteristics of network data and the point of the applied demand angle of the users.A top-down VPI model for network topology visualization and analysis drawing from the experience of domain experts by analyzing and understanding the nodes and connection status of network topology,having an insight into the potential laws of topological information like performance bottleneck,network security,time-varying characteristics and so on.This model includes vision,procedure,and interaction.According to the VPI model,visualization methods based on perception enhance were summarized from three aspects:enhancement of visual perception,enhancement of time-varied procedure and enhancement of exploratory interaction.Finally,future development trend of those topics were discussed combined with application demand.…”
    Get full text
    Article
  6. 4586

    Quantum public-key encryption protocol based on single-photon by Wen-jun LUO, Guan-li LIU

    Published 2014-11-01
    “…A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the method of block classification to lower the requirement for storage capacity of the sender.A new quantum source as transmission carrier was introduced and simply encoding and decoding rules were designed based on the laws of quantum non-cloning and ciphertext indistinguishability.On the other hand,classical one-time pad technique is used to ensure the security of quantum key and plaintext in the transmission channel.At the same time,select different updating strategy of quantum public-key according to the results of error detection which can significantly reduce key consumption.Compared with the previous quantum public-key encryption based on entangled states and single-photon,there are no entangled states and decoyed particles are needed,so it is not only efficient to reduce the overhead of communication traffic between legitimate users,but also easier to carry out in practice.The analysis shows that the proposed scheme is secure.…”
    Get full text
    Article
  7. 4587

    HD-SEIRS Malware Propagation Model in Heterogeneous Complex Networks by Elham Asadi, Soodeh Hosseini

    Published 2024-12-01
    “…With the widespread use of the Internet, the Web, and online social networks, the number of vulnerabilities and security threats has increased significantly. Various types of malwares (worms and viruses) have become a major threat to the security of systems and networks. …”
    Get full text
    Article
  8. 4588

    Environmental impacts of restructuring the EU’s natural gas supply and consumption: Learnings from the 2022 energy crisis by Lucas F. Santos, Robert Istrate, Niall Mac Dowell, Gonzalo Guillén-Gosálbez

    Published 2025-01-01
    “…Summary: In 2022, the European Union put forward the REPowerEU plan in response to Russia’s invasion of Ukraine, aiming at enhancing short-term energy security by diversifying imports and reducing natural gas demand while accelerating the deployment of renewable alternatives in the long term. …”
    Get full text
    Article
  9. 4589

    Medical Image Encryption and Decryption Based on DNA: A Survey by Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, Nurulisma Binti Hj. Ismail

    Published 2023-09-01
    “…If DNA is employed appropriately, it can be used to achieve a number of security technologies, including encryption, steganography, signature, and authentication through the use of DNA molecules as information carriers. …”
    Get full text
    Article
  10. 4590

    Chaotic Motions in the Real Fuzzy Electronic Circuits by Shih-Yu Li, Cheng-Hsiung Yang, Chin-Teng Lin, Li-Wei Ko, Tien-Ting Chiu

    Published 2013-01-01
    “…In the research field of secure communications, the original source should be blended with other complex signals. …”
    Get full text
    Article
  11. 4591

    Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture by Yingjie XIA, Siyu ZHU, Xuejiao LIU

    Published 2023-04-01
    “…In order to balance the security and efficiency of vehicle platoon cross trust-domain identity authentication, an efficient cross trust-domain group authentication scheme with conditional privacy of vehicle platoon under blockchian architecture was proposed.A novel block structure BM-Tree was designed for vehicle platoon identity authentication, which provided support for efficient cross trust-domain group authentication by sharing the group authentication parame-ters on the blockchain.Dynamic pseudonym was used for vehicle identity privacy-preserving and bilinear mapping was used to transform the trust-domain parameters, which realized cross trust-domain group authentication with conditional privacy.An efficient group authentication protocol based on BM-Tree was proposed, which realized batch identity au-thentication and re-authentication of vehicle platoon.The proposed scheme has better performance than existing cross trust-domain authentication methods in terms of security and computational overhead.Experimental result shows that the authentication delay is reduced by 29%, 25% and 53% on average, respectively compared with BLA, MDPA and BBA.…”
    Get full text
    Article
  12. 4592

    Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy by Renwu Yan, Yang Zheng, Ning Yu, Cen Liang

    Published 2024-03-01
    “…Even if an attacker has enough background knowledge, the security of the electricity information of one another can be ensured.…”
    Get full text
    Article
  13. 4593

    A Critique on “Economic Threats and Resistance Economy” by Seyyed Shamseddin Hosseini

    Published 2017-07-01
    “…It is necessary to pay more attention to requirements and consistency of resistance economy patterns, comprehensive defense, and security pattern and its role in resistance economy. …”
    Get full text
    Article
  14. 4594

    Quantification of nipple size and shape among an ethnically diverse sample of US women by Peter Wildfeuer, Alexis Alban, Bob Worrell, Shilo Ben Zeev, Judith Shamian, Mike Woolridge

    Published 2023-09-01
    “…Viable data were secured from 78% of the scans undertaken, yielding 538 datasets from 329 participants. …”
    Get full text
    Article
  15. 4595

    Date Attachable Offline Electronic Cash Scheme by Chun-I Fan, Wei-Zhe Sun, Hoi-Tung Hau

    Published 2014-01-01
    “…Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.…”
    Get full text
    Article
  16. 4596

    Ranking the Return on Assets of Tehran Stock Exchange by a New Method Based on Z-Numbers Data by Maryam Farzam, Mozhdeh Afshar Kermani, Tofigh Allahviranloo, Azim Aminataei

    Published 2023-01-01
    “…The advantage of this method over conventional fuzzy methods is considering uncertainty and allocating credit in the opinion of experts to estimate fuzzy parameters, and in the second example, we ranked the factors which affect the productivity of tourism security. Then, by using the proposed algorithm, we introduce the most important and the least important factors for tourist security budgeting.…”
    Get full text
    Article
  17. 4597

    Modernization of the Chinese People’s Liberation Army by A. M. Belyaev, F. F. Sharipov, M. A. Dyakonova

    Published 2024-08-01
    “…Until recently, China’s national security was primarily associated with the economic development of the country and national economy systemic modernization.   …”
    Get full text
    Article
  18. 4598

    A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics by Zhuo Hao, Sheng Zhong, Nenghai Yu

    Published 2013-01-01
    “…We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. …”
    Get full text
    Article
  19. 4599

    Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition by Ze Li, Duoyong Sun, Bo Li, Zhanfeng Li, Aobo Li

    Published 2018-01-01
    “…Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. Effective prediction of the behavior not only facilitates the understanding of the dynamics of organizational behaviors but also supports homeland security’s missions in prevention, preparedness, and response to terrorist acts. …”
    Get full text
    Article
  20. 4600

    Efficient information exchange approach for medical IoT based on AI and DAG-enabled blockchain by Shanqin Wang, Gangxin Du, Shufan Dai, Mengjun Miao, Miao Zhang

    Published 2025-01-01
    “…The development of artificial intelligence (AI) based medical Internet of Things (IoT) technology plays a crucial role in making the collection and exchange of medical information more convenient. However, security, privacy, and efficiency issues during information exchange have become pressing challenges. …”
    Get full text
    Article