Showing 501 - 520 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 501
  2. 502
  3. 503
  4. 504

    Efficient identification protocol provably secure in standard model by LI Yan-ping1, WANG Yu-min1

    Published 2009-01-01
    “…The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. …”
    Get full text
    Article
  5. 505
  6. 506

    SSDHT:social network-based secure DHT mechanism by Panpan LI, Zhengxia XIE, Guangxue YUE, Bolin MA, Li CHEN, Jianhua LIU

    Published 2018-11-01
    “…P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed,which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.…”
    Get full text
    Article
  7. 507

    Application of artificial intelligence technology in the field of security vulnerability by Hongyu SUN, Yuan HE, Jice WANG, Ying DONG, Lipeng ZHU, He WANG, Yuqing ZHANG

    Published 2018-08-01
    “…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
    Get full text
    Article
  8. 508

    Economic security of the enterprise: The essence, structure and mechanism of ensuring by Liubov Kovalska, Оleksandr Holii, Valentyn Holii

    Published 2023-03-01
    Subjects: “…economic security; enterprise; financial security; intellectual and personnel security; information security; technical and technological security; factors; methods…”
    Get full text
    Article
  9. 509
  10. 510
  11. 511
  12. 512
  13. 513
  14. 514

    Managing economic climate security: theoretical and applied aspects by E. N. Yakovleva

    Published 2022-01-01
    “…The article proposes to consider climate security as an important factor in the sustainable development of the economy. …”
    Get full text
    Article
  15. 515

    Benelux countries’ security strategies: between europeanism and atlanticism by Anastasia A. Posazhennikova

    Published 2024-08-01
    “…In the article, transformation of the foreign policy and security strategies of the Benelux countries – Belgium, the Netherlands and Luxembourg – is analyzed against the exacerbating conflict in Ukraine. …”
    Get full text
    Article
  16. 516
  17. 517
  18. 518
  19. 519

    Innovative resource-saving security strategies for IoT devices by Inna Rozlomii, Andrii Yarmilko, Serhii Naumenko

    Published 2025-01-01
    “…Emphasis is placed on developing adaptive security mechanisms that can effectively respond to dynamic operational conditions and resource constraints. …”
    Get full text
    Article
  20. 520