Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5241
Design of mobile payment system based on NFC
Published 2018-02-01“…The advantages,drawbacks and security of different mobile payment models were analyzed,and the defects of the existing mobile payment schemes were pointed out.To solve the above problems,a new mobile payment scheme based on the NFC and fingerprint identification was designed.The main function modules and date flow of the scheme were introduced.The prototype of the mobile payment system was realized.The main function and the whole technological process were tested,and significant references for establishing NFC based mobile payment systems were also provided.…”
Get full text
Article -
5242
Survey of DDoS defense:challenges and directions
Published 2017-10-01“…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
Get full text
Article -
5243
Decentralized searchable encryption scheme based on dynamic accumulator
Published 2019-04-01“…Since the flourish of the blockchain technology,a series of applications based on blockchain technology are emerging,and the decentralized storage service becomes the killer App in the decentralized markets,such as StorJ,Filecoin.Comparing with the centralized storage,decentralized storage are more secure,cheaper and more scalable.However,client’s privacy cannot be protected in existed decentralized storage apps.The idea of implementing the searchable encryption scheme with decentralized storage was proposed to improve the user’s privacy and utilizing the dynamic accumulator to improve the search efficiency of the searchable encryption scheme.…”
Get full text
Article -
5244
Generation a shared secret using artificial neural networks
Published 2019-08-01“…There are no recommendations on the choice of parameters of the used networks, ensuring acceptable speed and guaranteed confidentiality of the generated general secret.In this regard, it is interesting to substantiate the rational values of the parameters of ANN from the point of view of cryptographic requirements and security analysis of the proposed method of formation of cryptographic keys.…”
Get full text
Article -
5245
Pedestrian inertial navigation: An overview of model and data-driven approaches
Published 2025-03-01“…The task of indoor positioning is fundamental to several applications, including navigation, healthcare, location-based services, and security. An emerging field is inertial navigation for pedestrians, which relies only on inertial sensors for positioning. …”
Get full text
Article -
5246
Cloud native network for intelligent Internet of everything
Published 2021-06-01“…A new cloud native network architecture for the future network architecture design in the era of intelligent Internet of everything was proposed, that is, network of the cloud, for the cloud, and by the cloud.Furthermore, the concept and mechanism of Cybertwin were proposed to tackle the challenges of mobility, security and availability in cloud native network.Three fundamental questions of cloud native network architecture design were also elaborated, that is, addressing, indexing and resource orchestration.Finally, 6G use cases and future research topics of Cybertwin based cloud native network were discussed.…”
Get full text
Article -
5247
Conflict potential of the Wahabian communities in the Western Balkans area
Published 2024-01-01“…Also, the goal is to determine how much of a security threat the Wahhabi communities pose to the Western Balkans and what are the goals of the radical Islamists who create and commit these communities. …”
Get full text
Article -
5248
Survey on open source edge computing platforms
Published 2021-04-01“…Firstly, the basic concept of edge computing (EC) and its current state of research were introduced.Moreover, the design requirements of edge computing platforms from multiple perspectives were discussed.Then, four typical open source platforms were presented in detail, and their similarities and differences in terms of application areas, deployment methods were analyzed.Later, with regard to two typical use cases, their installations and advantages were summarized and analyzed.Finally, key challenges such as the cooperation among edge computing platforms, security and standardization were discussed.…”
Get full text
Article -
5249
Asymptotic Exponential Arbitrage in the Schwartz Commodity Futures Model
Published 2019-01-01“…Next, we find by comparison that, under some similar conditions, our result is a corresponding commodity assets (stronger) version of Föllmer and Schachermayer’s result stated in the modeling setting of geometric Ornstein-Uhlenbeck process for financial security assets.…”
Get full text
Article -
5250
Research on reconfigurable information communication basal network architecture
Published 2014-01-01“…Based on the thinking of network reconfiguration,the reconfigurable information communication basal network architecture was proposed,and then the network atomic capacity theory,polymorphic addressing and routing mechanism,network reconfiguration mechanism and the secure manageability and controllability mechanism were put forward respectively.The architecture would provide a resolution for current and future applications with different quality of services,flexible and expansible function,universal inter-connection,heterogeneous convergence,manageability and controllability,which also supports the compatible evolution with current internet and is feasible to be implemented on a large scale.…”
Get full text
Article -
5251
Analysis and thought on quantum insert technology
Published 2017-08-01“…Quantum insert (QI) is a technology that makes redirection attacks by injecting malicious content into certain sessions.A brief introduction of American “Quantum Insert” project was given and the connotation of this technology was discussed.It then looked into the application that quantum insert was put to in the Internet “Great Cannon” event.An open source QI tool made available by Fox IT,an IT security company,was then analyzed.An experimental verification environment was built using this tool and a verification was made.Finally,a thought was given on how to put QI to use in building network defense.…”
Get full text
Article -
5252
Discussion of constructing unified DPI system by operators in the background of big data
Published 2017-04-01“…Mobile data traffic increases gradually.Operator's business model is transferring from “telephone traffic management” to “traffic management”.Big data management will become the main development direction of operators.For big data management,operators explore the value and application of DPI technology and make the unified DPI system standards to offer comprehensive and standard traffic data.The insufficiency of traditional DPI deployment mode was analyzed,and the unified DPI system to offer basic data security for accelerating development of big data was presented.…”
Get full text
Article -
5253
Fare non-repudiation protocol based on identity-based cryptography
Published 2009-01-01“…A signature scheme with the one-off blind public key was proposed based on identity-based cryptography,and thus was applied in a new fare non-repudiation protocol.In this protocol,the sender was anonymity,so avoid that the recipient deliberately rejected the files or delayed reading the files when the files were not good for them,which could assure the equity and non-repudiation of the communication between the sender and the recipient.The signature scheme with the one-off blind public key and non-repudiation protocol is both secure and effective by analysis.…”
Get full text
Article -
5254
Study on shared key management scheme for WSN based on LEACH protocol
Published 2016-08-01“…In order to achieve transmission safety,nodes longer life and higher operation efficiency for the hierar-chical wireless sensor network,a shared secret key management scheme for WSN based on LEACH protocol was proposed.The scheme has good integrity and timeliness,dynamic key safety,node security independence and key survival,and also has the ability to resist the man-in-the-middle attack,DDoS attacks and so on.Furthermore,en-ergy consumption is lower to distribute shared key,and efficiency is higher to operate network.…”
Get full text
Article -
5255
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01“…Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency and security of authentication.By using symmetric encryption technology, the proposed solution ensured the confidentiality of the message and increase the attack difficulty.The theoretical analysis proved the proposed scheme can resist common man-in-the-middle attacks.Experimental comparison results show the scheme has better performance than similar schemes.…”
Get full text
Article -
5256
On Family Relationships under the Laws of Hammurabi
Published 2012-10-01“…The family in the Hammurabi Code represents the basis not only for economic and financial power of the state, but also for its political stability and security. The rights and obligations of spouses are not equal, but they are together, though each in his own way, achieving the main goal of the marital union - the birth and upbringing of children.…”
Get full text
Article -
5257
Electricity Prices of the Future
Published 2022-06-01“…Secondly, additional instruments are needed to safeguard the security of supply. An thirdly, network charges need to account for the different role of the distribution network, which operates more and more as a platform. …”
Get full text
Article -
5258
Le système d’identification automatique (AIS)
Published 2015-12-01“…It enhances maritime safety and security. AIS’ contributions are undeniable in spite of some deficiencies and technical restrictions. …”
Get full text
Article -
5259
Research on the format-preserving encryption modes
Published 2011-01-01“…FPE(format-preserving encryption) was discussed,and it was shown that how to reduce domain complexity was the direction of designing FPE modes.A new FPE mode named coding-then-encipher mode was proposed and its operating principle and security were described in detail,and it was pointed out that the key for this mode was finding efficient encode and decode algorithms on domain.Furthermore,a scheme under coding-then-encipher mode which can resolve FPE problem in charsn was presented,the encode and decode algorithms were described,and their efficiency were analyzed.…”
Get full text
Article -
5260
Value-based adoption of MDS:an empirical investigation
Published 2008-01-01“…The influence factors of customers’ behavioral intention,and constructs the regression model for the influence factors of customers behavioral intention of mobile data services(VAMDS) was analyzed.China mobile users of ease-own,GoTone and M-zone are chosen as our random surveys in Beijing,Nanjing and Chongqing.That the top three most important factors of customers behavioral intention of MDS are price,usefulness and social influence,and the security for customers’ behavioral intention validated by overseas scholars isn’t supported in the main MDS in China now.…”
Get full text
Article