Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4701
An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography
Published 2019-01-01“…It is one of the important methods to use voice service in VoIP as steganographic carrier to ensure secure transmission. However, the traditional steganographic code has some problems, such as low embedding efficiency and weak concealment, which cannot meet the requirements of VoIP streaming media information hiding for the security of secret information. …”
Get full text
Article -
4702
Global agricultural trade architecture: contemporary triggers
Published 2024-12-01“…It has also been found that world agricultural commodity prices will stabilize in the medium term, which is an important factor in the food security of developing countries.…”
Get full text
Article -
4703
Authenticity at Risk: Key Factors in the Generation and Detection of Audio Deepfakes
Published 2025-01-01“…Detecting audio deepfakes is crucial to ensure authenticity and security, especially in contexts where audio veracity can have critical implications, such as in the legal, security or human rights domains. …”
Get full text
Article -
4704
Fuzzy logic based social trust computation scheme in Flying Ad-hoc network
Published 2025-03-01“…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
Get full text
Article -
4705
An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
Published 2013-01-01“…However, these schemes suffered from certain security problems or their cost consumption exceeded users’ own constrained ability. …”
Get full text
Article -
4706
Technologie energetycznego wykorzystania odpadów
Published 2011-06-01“…These benefits concern both environmental reasons, as well as freedom from conventional energy sources and increasing energy security. The article discusses the biogas technology and plasma technology as the most promising waste to energy technologies.…”
Get full text
Article -
4707
Multi-party summation query method based on differential privacy
Published 2020-06-01“…Differential privacy is considered to be a very reliable protection mechanism because it does not require the a prior knowledge for the attacker.However,differential privacy is rarely used in a multi-party environment.In view of this,the differential privacy is applied to the data summation query in multi-party environment.This method was described in detail and proved the security of the method.…”
Get full text
Article -
4708
Effects of a β-glucan-enriched diet on biomarkers of oxidative stress, energy metabolism and lysosomal function in muscle tissue of European grayling (Thymallus thymallus L.)
Published 2024-11-01“…The grayling (Thymallus thymallus L.) has several advantages over other fish species that make it attractive for aquaculture and invest it with importance for food security. The study assessed the effects of a β-glucan-enriched diet on biomarkers of oxidative stress, energy metabolism and lysosomal function in muscle tissue of European grayling (Thymallus thymallus L.).…”
Get full text
Article -
4709
Research of location privacy protection in wireless sensor network
Published 2017-11-01“…For deeply studying and solving the problems of location privacy protection in WSN,characteristics and models of location privacy protection were analyzed,schemes of location privacy protection were categorized by source,base station and the classification of their technologies.The merits and demerits in different attack types,security,efficiency and energy consumption were compared and the future research orientation was previewed.…”
Get full text
Article -
4710
ID-based transitive signature schemes without random oracle
Published 2010-01-01“…Based on waters’ signature scheme,the first identity-based transitive signature scheme was proposed and proved secure against attacks in the standard model.Compared with current transitive signature schemes,the unforgeability of the signature’s transitivity of the proposed scheme was reduced to the CDH assumption based on the bilinear pairing.A complexity analysis of the proposed scheme was thereafter presented.…”
Get full text
Article -
4711
Application and farmework of BaaS platform based on blockchain
Published 2020-09-01“…To eliminate the interrelated operational effects of complex and long chains in the telecom industry,and to solve the problem of data consistency guarantee such as reconciliation and liquidation.A blockchain-based BaaS platform was designed,a permissioned blockchain with user information was deployed,and a trusted blockchain ledger was built.It realizes the trust,security and fairness mechanism in telecommunication industry.…”
Get full text
Article -
4712
Measures against the financing of “lone wolves” and small terrorist cells in Europe
Published 2025-01-01“…The paper focuses on the emergence of new risks and threats to the European security system, such as the activity of “lone wolves” and small terrorist cells. …”
Get full text
Article -
4713
Exploring real estate blockchain adoption: An empirical study based on an integrated task-technology fit and technology acceptance model.
Published 2025-01-01“…The study's findings indicate that attitude, perceived usefulness (PU) and data privacy and security (DPS) exerts highest influence in the proposed theoretical model. …”
Get full text
Article -
4714
Indonesian Defense Diplomacy in Responding to China’s National Interest in South China Sea
Published 2023-03-01“…This study discovered that China’s national interests in the South China Sea center on securing its economic interests and military modernization. …”
Get full text
Article -
4715
FractalNet-based key generation for authentication in Voice over IP using Blockchain
Published 2025-03-01“…However, VoIP systems face critical security challenges, including threats to integrity, authenticity, and confidentiality. …”
Get full text
Article -
4716
NIGERIAN AIRFORCE STRATEGIC DEVELOPMENT AND CAPACITY IN THE FOURTH REPUBLIC, 2019-2023
Published 2024-09-01“…This situation has preoccupied the national security forces, including the Airforce which has carried out several operations to address these threats. …”
Get full text
Article -
4717
A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks
Published 2016-01-01“…With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. …”
Get full text
Article -
4718
Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison
Published 2025-01-01“…A simulation on the IBM Quantum Platform demonstrates the protocol’s feasibility, and a security analysis confirms its robustness against potential eavesdropping and participant attacks. …”
Get full text
Article -
4719
Cross-Border Printing Privileges in the Seventeenth-Century Low Countries
Published 2024-12-01“…Rather than seeing these cross-border privileges solely as a way for printers to expand the reach and commercial viability of their published works, this article demonstrates that, by securing privileges from multiple authorities, printers showed they were able to navigate the market for institutions and complex networks of power. …”
Get full text
Article -
4720
Fog-aided identity privacy protection scheme for sensing users in mobile crowd sensing
Published 2019-12-01“…In mobile crowd sensing(MCS),attackers can reconstruct the social circle among sensing users,who use the social association information among sensing users and the correlation between the sensing user’s identity and sensing data to further attack a social alliance.In order to tackle this issue,a fog-aided identity privacy protection scheme is proposed.Firstly,two fog nodes are introduced which located at the edge of the sensing terminal.The one is task allocation center (TC) for handling the reasonable allocation of sensing tasks,and the other is data center (DC) for calculating sensing data.Furthermore,differential privacy is employed for preventing attackers from acquiring the specific social association weight of sensing users.Finally,in order to prevent attackers from obtaining the sensing users' identity information and sensing data at the same time,sensing users use different blind identities to communicate with TC and DC.Security analysis indicates that the proposed scheme can ensure the security of identity privacy information of sensing users in the process of completing sensing tasks.Experimental results show that the proposed scheme can protect the social association information between sensing users,and has a low delay.…”
Get full text
Article