Showing 4,701 - 4,720 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4701

    An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography by Lejun Zhang, Xiaoyan Hu, Waqas Rasheed, Tianwen Huang, Chunhui Zhao

    Published 2019-01-01
    “…It is one of the important methods to use voice service in VoIP as steganographic carrier to ensure secure transmission. However, the traditional steganographic code has some problems, such as low embedding efficiency and weak concealment, which cannot meet the requirements of VoIP streaming media information hiding for the security of secret information. …”
    Get full text
    Article
  2. 4702

    Global agricultural trade architecture: contemporary triggers by E. N. Smirnov, E. A. Karelina, M. G. Pletnev

    Published 2024-12-01
    “…It has also been found that world agricultural commodity prices will stabilize in the medium term, which is an important factor in the food security of developing countries.…”
    Get full text
    Article
  3. 4703

    Authenticity at Risk: Key Factors in the Generation and Detection of Audio Deepfakes by Alba Martínez-Serrano, Claudia Montero-Ramírez, Carmen Peláez-Moreno

    Published 2025-01-01
    “…Detecting audio deepfakes is crucial to ensure authenticity and security, especially in contexts where audio veracity can have critical implications, such as in the legal, security or human rights domains. …”
    Get full text
    Article
  4. 4704

    Fuzzy logic based social trust computation scheme in Flying Ad-hoc network by Joydeep Kundu, Sahabul Alam, Arindam Dey

    Published 2025-03-01
    “…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
    Get full text
    Article
  5. 4705

    An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs by Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang

    Published 2013-01-01
    “…However, these schemes suffered from certain security problems or their cost consumption exceeded users’ own constrained ability. …”
    Get full text
    Article
  6. 4706

    Technologie energetycznego wykorzystania odpadów by Krzysztof Biernat, Paulina Luiza Dziołak, Izabela Samson-Bręk

    Published 2011-06-01
    “…These benefits concern both environmental reasons, as well as freedom from conventional energy sources and increasing energy security. The article discusses the biogas technology and plasma technology as the most promising waste to energy technologies.…”
    Get full text
    Article
  7. 4707

    Multi-party summation query method based on differential privacy by Xianmang HE

    Published 2020-06-01
    “…Differential privacy is considered to be a very reliable protection mechanism because it does not require the a prior knowledge for the attacker.However,differential privacy is rarely used in a multi-party environment.In view of this,the differential privacy is applied to the data summation query in multi-party environment.This method was described in detail and proved the security of the method.…”
    Get full text
    Article
  8. 4708

    Effects of a β-glucan-enriched diet on biomarkers of oxidative stress, energy metabolism and lysosomal function in muscle tissue of European grayling (Thymallus thymallus L.) by Kurhaluk Natalia, Grudniewska Joanna, Tkaczenko Halina

    Published 2024-11-01
    “…The grayling (Thymallus thymallus L.) has several advantages over other fish species that make it attractive for aquaculture and invest it with importance for food security. The study assessed the effects of a β-glucan-enriched diet on biomarkers of oxidative stress, energy metabolism and lysosomal function in muscle tissue of European grayling (Thymallus thymallus L.).…”
    Get full text
    Article
  9. 4709

    Research of location privacy protection in wireless sensor network by Ren-ji HUANG, Qing YE, Qian WU

    Published 2017-11-01
    “…For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.…”
    Get full text
    Article
  10. 4710

    ID-based transitive signature schemes without random oracle by MA Xiao-long1, GU Li-ze1, CUI Wei4, YANG Yi-xian1, HU Zheng-ming1

    Published 2010-01-01
    “…Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s transitivity of the proposed scheme was reduced to the CDH assumption based on the bilinear pairing.A complexity analysis of the proposed scheme was thereafter presented.…”
    Get full text
    Article
  11. 4711

    Application and farmework of BaaS platform based on blockchain by Lei QI, Hao ZHU, Huiqiong GU, Xu CHEN, Bo HU

    Published 2020-09-01
    “…To eliminate the interrelated operational effects of complex and long chains in the telecom industry,and to solve the problem of data consistency guarantee such as reconciliation and liquidation.A blockchain-based BaaS platform was designed,a permissioned blockchain with user information was deployed,and a trusted blockchain ledger was built.It realizes the trust,security and fairness mechanism in telecommunication industry.…”
    Get full text
    Article
  12. 4712

    Measures against the financing of “lone wolves” and small terrorist cells in Europe by Svetoslav YORDANOV

    Published 2025-01-01
    “…The paper focuses on the emergence of new risks and threats to the European security system, such as the activity of “lone wolves” and small terrorist cells. …”
    Get full text
    Article
  13. 4713

    Exploring real estate blockchain adoption: An empirical study based on an integrated task-technology fit and technology acceptance model. by Hailan Yang, Zixian Zhang, Chen Jian, Nisar Ahmad

    Published 2025-01-01
    “…The study's findings indicate that attitude, perceived usefulness (PU) and data privacy and security (DPS) exerts highest influence in the proposed theoretical model. …”
    Get full text
    Article
  14. 4714

    Indonesian Defense Diplomacy in Responding to China’s National Interest in South China Sea by Surryanto Djoko Waluyo

    Published 2023-03-01
    “…This study discovered that China’s national interests in the South China Sea center on securing its economic interests and military modernization. …”
    Get full text
    Article
  15. 4715

    FractalNet-based key generation for authentication in Voice over IP using Blockchain by Vajjala Sreenivasulu, Chinthaginjala Ravikumar

    Published 2025-03-01
    “…However, VoIP systems face critical security challenges, including threats to integrity, authenticity, and confidentiality. …”
    Get full text
    Article
  16. 4716

    NIGERIAN AIRFORCE STRATEGIC DEVELOPMENT AND CAPACITY IN THE FOURTH REPUBLIC, 2019-2023 by EFEFIONG ASUQUO EDET, INAH EMMANUEL MKPE, AKPANKE BETIANG JOSEPH

    Published 2024-09-01
    “…This situation has preoccupied the national security forces, including the Airforce which has carried out several operations to address these threats. …”
    Get full text
    Article
  17. 4717

    A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks by Yasmin M. Amin, Amr T. Abdel-Hamid

    Published 2016-01-01
    “…With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
    Get full text
    Article
  18. 4718

    Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison by Min Hou, Yue Wu

    Published 2025-01-01
    “…A simulation on the IBM Quantum Platform demonstrates the protocol’s feasibility, and a security analysis confirms its robustness against potential eavesdropping and participant attacks. …”
    Get full text
    Article
  19. 4719

    Cross-Border Printing Privileges in the Seventeenth-Century Low Countries by Nina Lamal

    Published 2024-12-01
    “…Rather than seeing these cross-border privileges solely as a way for printers to expand the reach and commercial viability of their published works, this article demonstrates that, by securing privileges from multiple authorities, printers showed they were able to navigate the market for institutions and complex networks of power. …”
    Get full text
    Article
  20. 4720

    Fog-aided identity privacy protection scheme for sensing users in mobile crowd sensing by Hui LIU, Renwan BI, Jinbo XIONG, Mingfeng ZHAO, Biao JIN, Jie LIN

    Published 2019-12-01
    “…In mobile crowd sensing(MCS),attackers can reconstruct the social circle among sensing users,who use the social association information among sensing users and the correlation between the sensing user’s identity and sensing data to further attack a social alliance.In order to tackle this issue,a fog-aided identity privacy protection scheme is proposed.Firstly,two fog nodes are introduced which located at the edge of the sensing terminal.The one is task allocation center (TC) for handling the reasonable allocation of sensing tasks,and the other is data center (DC) for calculating sensing data.Furthermore,differential privacy is employed for preventing attackers from acquiring the specific social association weight of sensing users.Finally,in order to prevent attackers from obtaining the sensing users' identity information and sensing data at the same time,sensing users use different blind identities to communicate with TC and DC.Security analysis indicates that the proposed scheme can ensure the security of identity privacy information of sensing users in the process of completing sensing tasks.Experimental results show that the proposed scheme can protect the social association information between sensing users,and has a low delay.…”
    Get full text
    Article