Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5021
Value prospect and technical characteristics of 6G
Published 2019-12-01“…Combined with the value identification for 5G,the prospect of 6G values was made,and the characteristics of coverage,openness,security and independence of 6G were analyzed.It concludes that if 6G is viewed as the fundamentals for developing both the technological innovation and business mode innovation and is put into the top priority satisfying the expectations for experiencing applications and contents of 6G,the 6G may be far better than 5G,not just 1G advantage,numerically.…”
Get full text
Article -
5022
Putting Knowledge to Work: Outcome Performance of the UF/IFAS Welfare to Work Initiative
Published 2002-11-01“… This report, Putting Knowledge to Work: Outcome Performance of the UF/IFAS Welfare-to-Work Initiative as of May 11, 2001, is part of the UF/IFAS Welfare to Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
Get full text
Article -
5023
New affiliation-hiding authenticated key exchange protocol
Published 2015-09-01“…A new affiliation-hiding authenticated key agreement protocol was proposed.The proposal enables two anonymous users to accomplish a successful secret authentication and key agreement when their groups set intersection is non-empty and the cardinality of the set intersection should not be less than a threshold value.Meanwhile,the affiliations of groups outside of the set intersection remain confidential.The proposal is provably secure under the random oracle model,and the performance of the scheme is still competitive.…”
Get full text
Article -
5024
Impending Carotid Blowout Stabilization Using an LT-D Tube
Published 2014-01-01“…Reducing the bleeding and securing the airway are essential before more definitive management. …”
Get full text
Article -
5025
Identity-based incremental signature scheme from lattices
Published 2021-01-01“…By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against adaptive chosen identity and chosen message attacks in the standard model, assuming the hardness of the small integer solution problem.Theoretical analysis and experimental results show that the computational overhead of the incremental signature algorithm is less than that of the standard signature algorithm.…”
Get full text
Article -
5026
Cryptanalysis of the Vesta-2M stream cipher
Published 2003-01-01“…The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. …”
Get full text
Article -
5027
Silences and Accents in the Construction of Gender Violence as a Social Problem in Quito
Published 2016-05-01“…Five different matrices are examined: sexuality, health, human rights; security and disciplinary practices. The analysis demonstrates that the actors and voices that attempted to generate ruptures in the status quo have been silenced, while those that have perpetuated the patriarchal order have become hegemonic.…”
Get full text
Article -
5028
Approche clinique et didactique de l’inclusion des élèves porteurs de troubles du comportement
Published 2022-09-01“…Authors address an in-between posture and transitional phenomenon as key elements to offer secured learning situations and contexts. Inclusiveness at stake summons scaffholded frameworks to support learning processes for students and their teachers.…”
Get full text
Article -
5029
Biharmonic eigen-value problems and Lp estimates
Published 1990-01-01“…Biharmonic eigen-values arise in the study of static equilibrium of an elastic body which has been suitably secured at the boundary. This paper is concerned mainly with the existence of and Lp-estimates for the solutions of certain biharmonic boundary value problems which are related to the first eigen-values of the associated biharmonic operators. …”
Get full text
Article -
5030
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
Published 2018-09-01“…To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology were adopted,and the dynamic password ,facial recognition and two-dimension code to modify the traditional identification method were combined to design a kind of identification agreement on mobile terminal.The study analyzed the efficiently and security of the agreement,which reflected that the agreement could guarantee users’ privacy when it provide high-efficient identification.…”
Get full text
Article -
5031
FEATURES OF THE DEVELOPMENT OF THE OIL AND PIPE INDUSTRY AS OBJECT OF STUDY TO IDENTIFY STRATEGIC GUIDELINES FOR THEIR INTERACTION
Published 2016-04-01“…The main strategic goal of the oil industry and the industry for the production of tubes for pipelines must be the economic supply security of the Russian Federation to ensure the effective promotion of the socio economic development of the countr.…”
Get full text
Article -
5032
Putting Knowledge to Work: Outcome Performance of the UF/IFAS Welfare to Work Initiative
Published 2002-11-01“… This report, Putting Knowledge to Work: Outcome Performance of the UF/IFAS Welfare-to-Work Initiative as of May 11, 2001, is part of the UF/IFAS Welfare to Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
Get full text
Article -
5033
Main Reasons for the Transformation of Mandatory Hungarian Private Pension Funds
Published 2016-06-01“…The main purpose of writing this paper was to provide a clear summary of the main facts and motives of restructuring the financing of Hungarian social security system which has been in process since 2010. …”
Get full text
Article -
5034
Arthroscopic Repair of the Anterior Inferior Tibiofibular Ligament
Published 2025-01-01“…Open reduction and repair of the anterior part of the syndesmosis is a proposed method to secure anatomic syndesmotic reduction in addition to improving the rotational stability of the ankle mortise. …”
Get full text
Article -
5035
Research on High Voltage Direct Current Power Supply System for Telecommunications
Published 2013-08-01“…The analysis was made for the nominal voltage selection and system design method which was based on energy efficiency prompt and power reliability increasing,these different goals to replace AC power system by DC power system,and these two direct current power supply system was introduced.It was compared that the reliability,the efficiency,the security and the input/output ratio which could prove the scientifically and large-scale application feasibility of 240V direct current power supply system.…”
Get full text
Article -
5036
Blind signature scheme based on entangled quantum
Published 2016-02-01“…Different from the classical blind signatures which based on the mathematics difficulty, the scheme could guarantee not only the anonymity but also the unconditionally security.…”
Get full text
Article -
5037
ANALYSING EFFICIENCY OF AGGRESSIVE ETF-COMPOSED PORTFOLIO STRATEGIES
Published 2014-06-01“…Based on the results of the t-tests, one can conclude whether the above-mentioned market segment is inefficient or partially inefficient, which would mean one can find an "aggressive"strategy to secure stable above-market returns.…”
Get full text
Article -
5038
Analysis of Natural Aging Behavior of Asphalt Binder in Cold and Arid Region
Published 2022-01-01Get full text
Article -
5039
-
5040
Data traceability mechanism based on consortium chain
Published 2023-10-01“…With the unprecedented growth in the speed of data generation and circulation in the era of big data, the emergence of blockchain technology provides a new solution for data authenticity verification.However, with the increasing demand for data flow between different blockchains, new security issues arise.Cross-chain data transmission can lead to data leakage, and detecting data leakage caused by illegal access becomes challenging.To address these problems, a data traceability mechanism based on a consortium chain was proposed.A cross-blockchain data traceability model was designed, incorporating private data pipelines to ensure the security of cross-chain data transmission.User behaviors were recorded through authorization and access logs, ensuring the traceability of illegal unauthorized access.To improve the efficiency of data traceability and query, an on-chain and off-chain synchronous storage mechanism was adopted.The state of data flow before each transaction was encrypted and stored in the database, and its index was stored in the blockchain transaction.This enables a one-to-one correspondence between on-chain and off-chain data.Additionally, Merkle trees were introduced into the block body to store block summaries, enhancing the efficiency of block legitimacy verification.Based on the data storage form and cross-chain data interaction mechanism, a data traceability algorithm was designed.The traceability results were displayed in the form of an ordered tree.An experimental environment for consortium chain traceability was built using fabric, targeting the cross-domain data traceability scenario in the e-commerce industry.The GO language was used to simulate and test the data traceability performance with a large number of blocks and transactions.The results demonstrate that with the increasing number of blocks and transactions, the proposed data traceability mechanism maintains satisfactory performance.…”
Get full text
Article