Showing 5,241 - 5,260 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5241

    Design of mobile payment system based on NFC by Jingwen LIU, Wei XU, Boxuan LV, Dan WANG, Wenying NIE, Ning FAN

    Published 2018-02-01
    “…The advantages,drawbacks and security of different mobile payment models were analyzed,and the defects of the existing mobile payment schemes were pointed out.To solve the above problems,a new mobile payment scheme based on the NFC and fingerprint identification was designed.The main function modules and date flow of the scheme were introduced.The prototype of the mobile payment system was realized.The main function and the whole technological process were tested,and significant references for establishing NFC based mobile payment systems were also provided.…”
    Get full text
    Article
  2. 5242

    Survey of DDoS defense:challenges and directions by Fei CHEN, Xiao-hong BI, Jing-jing WANG, Yuan LIU

    Published 2017-10-01
    “…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
    Get full text
    Article
  3. 5243

    Decentralized searchable encryption scheme based on dynamic accumulator by Yan ZHANG, Jinfan WANG, Zhuyun QI, Rongwei YANG, Yi WANG

    Published 2019-04-01
    “…Since the flourish of the blockchain technology,a series of applications based on blockchain technology are emerging,and the decentralized storage service becomes the killer App in the decentralized markets,such as StorJ,Filecoin.Comparing with the centralized storage,decentralized storage are more secure,cheaper and more scalable.However,client’s privacy cannot be protected in existed decentralized storage apps.The idea of implementing the searchable encryption scheme with decentralized storage was proposed to improve the user’s privacy and utilizing the dynamic accumulator to improve the search efficiency of the searchable encryption scheme.…”
    Get full text
    Article
  4. 5244

    Generation a shared secret using artificial neural networks by U. F. Holikau, M. L. Radziukevich

    Published 2019-08-01
    “…There are no recommendations on the choice of parameters of the used networks, ensuring acceptable speed and guaranteed confidentiality of the generated general secret.In this regard, it is interesting to substantiate the rational values of the parameters of ANN from the point of view of cryptographic requirements and security analysis of the proposed method of formation of cryptographic keys.…”
    Get full text
    Article
  5. 5245

    Pedestrian inertial navigation: An overview of model and data-driven approaches by Itzik Klein

    Published 2025-03-01
    “…The task of indoor positioning is fundamental to several applications, including navigation, healthcare, location-based services, and security. An emerging field is inertial navigation for pedestrians, which relies only on inertial sensors for positioning. …”
    Get full text
    Article
  6. 5246

    Cloud native network for intelligent Internet of everything by Quan YU, Dandan LIANG, Wei ZHANG

    Published 2021-06-01
    “…A new cloud native network architecture for the future network architecture design in the era of intelligent Internet of everything was proposed, that is, network of the cloud, for the cloud, and by the cloud.Furthermore, the concept and mechanism of Cybertwin were proposed to tackle the challenges of mobility, security and availability in cloud native network.Three fundamental questions of cloud native network architecture design were also elaborated, that is, addressing, indexing and resource orchestration.Finally, 6G use cases and future research topics of Cybertwin based cloud native network were discussed.…”
    Get full text
    Article
  7. 5247

    Conflict potential of the Wahabian communities in the Western Balkans area by Mijalković Saša, Baškalo Duško

    Published 2024-01-01
    “…Also, the goal is to determine how much of a security threat the Wahhabi communities pose to the Western Balkans and what are the goals of the radical Islamists who create and commit these communities. …”
    Get full text
    Article
  8. 5248

    Survey on open source edge computing platforms by Dier GU, Hua LU, Renchao XIE, Tao HUANG

    Published 2021-04-01
    “…Firstly, the basic concept of edge computing (EC) and its current state of research were introduced.Moreover, the design requirements of edge computing platforms from multiple perspectives were discussed.Then, four typical open source platforms were presented in detail, and their similarities and differences in terms of application areas, deployment methods were analyzed.Later, with regard to two typical use cases, their installations and advantages were summarized and analyzed.Finally, key challenges such as the cooperation among edge computing platforms, security and standardization were discussed.…”
    Get full text
    Article
  9. 5249

    Asymptotic Exponential Arbitrage in the Schwartz Commodity Futures Model by Tesfamariam Tadesse Welemical, Jane Akinyi Aduda, Martin Le Doux Mbele Bidima

    Published 2019-01-01
    “…Next, we find by comparison that, under some similar conditions, our result is a corresponding commodity assets (stronger) version of Föllmer and Schachermayer’s result stated in the modeling setting of geometric Ornstein-Uhlenbeck process for financial security assets.…”
    Get full text
    Article
  10. 5250

    Research on reconfigurable information communication basal network architecture by Ju-long LAN, Dong-nian CHENG, Yu-xiang HU

    Published 2014-01-01
    “…Based on the thinking of network reconfiguration,the reconfigurable information communication basal network architecture was proposed,and then the network atomic capacity theory,polymorphic addressing and routing mechanism,network reconfiguration mechanism and the secure manageability and controllability mechanism were put forward respectively.The architecture would provide a resolution for current and future applications with different quality of services,flexible and expansible function,universal inter-connection,heterogeneous convergence,manageability and controllability,which also supports the compatible evolution with current internet and is feasible to be implemented on a large scale.…”
    Get full text
    Article
  11. 5251

    Analysis and thought on quantum insert technology by Xue-bo ZHANG, Si WANG, Hong-xia ZOU

    Published 2017-08-01
    “…Quantum insert (QI) is a technology that makes redirection attacks by injecting malicious content into certain sessions.A brief introduction of American “Quantum Insert” project was given and the connotation of this technology was discussed.It then looked into the application that quantum insert was put to in the Internet “Great Cannon” event.An open source QI tool made available by Fox IT,an IT security company,was then analyzed.An experimental verification environment was built using this tool and a verification was made.Finally,a thought was given on how to put QI to use in building network defense.…”
    Get full text
    Article
  12. 5252

    Discussion of constructing unified DPI system by operators in the background of big data by Huifang HOU, Jie PAN

    Published 2017-04-01
    “…Mobile data traffic increases gradually.Operator's business model is transferring from “telephone traffic management” to “traffic management”.Big data management will become the main development direction of operators.For big data management,operators explore the value and application of DPI technology and make the unified DPI system standards to offer comprehensive and standard traffic data.The insufficiency of traditional DPI deployment mode was analyzed,and the unified DPI system to offer basic data security for accelerating development of big data was presented.…”
    Get full text
    Article
  13. 5253

    Fare non-repudiation protocol based on identity-based cryptography by LIU Hong-wei, XIE Wei-xin, YU Jian-ping, ZHANG Peng

    Published 2009-01-01
    “…A signature scheme with the one-off blind public key was proposed based on identity-based cryptography,and thus was applied in a new fare non-repudiation protocol.In this protocol,the sender was anonymity,so avoid that the recipient deliberately rejected the files or delayed reading the files when the files were not good for them,which could assure the equity and non-repudiation of the communication between the sender and the recipient.The signature scheme with the one-off blind public key and non-repudiation protocol is both secure and effective by analysis.…”
    Get full text
    Article
  14. 5254

    Study on shared key management scheme for WSN based on LEACH protocol by Min FAN, Jue JIANG, Lin TANG, Mo-ran QIU, Chao LI

    Published 2016-08-01
    “…In order to achieve transmission safety,nodes longer life and higher operation efficiency for the hierar-chical wireless sensor network,a shared secret key management scheme for WSN based on LEACH protocol was proposed.The scheme has good integrity and timeliness,dynamic key safety,node security independence and key survival,and also has the ability to resist the man-in-the-middle attack,DDoS attacks and so on.Furthermore,en-ergy consumption is lower to distribute shared key,and efficiency is higher to operate network.…”
    Get full text
    Article
  15. 5255

    Preventing man-in-the-middle attacks in DNS through certificate less signature by Yang HU, Zengjie HAN, Guohua YE, Zhiqiang YAO

    Published 2021-12-01
    “…Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency and security of authentication.By using symmetric encryption technology, the proposed solution ensured the confidentiality of the message and increase the attack difficulty.The theoretical analysis proved the proposed scheme can resist common man-in-the-middle attacks.Experimental comparison results show the scheme has better performance than similar schemes.…”
    Get full text
    Article
  16. 5256

    On Family Relationships under the Laws of Hammurabi by K. V. Karpenko

    Published 2012-10-01
    “…The family in the Hammurabi Code represents the basis not only for economic and financial power of the state, but also for its political stability and security. The rights and obligations of spouses are not equal, but they are together, though each in his own way, achieving the main goal of the marital union - the birth and upbringing of children.…”
    Get full text
    Article
  17. 5257

    Electricity Prices of the Future by Justus Haucap, Jonathan Meinhof

    Published 2022-06-01
    “…Secondly, additional instruments are needed to safeguard the security of supply. An thirdly, network charges need to account for the different role of the distribution network, which operates more and more as a platform. …”
    Get full text
    Article
  18. 5258

    Le système d’identification automatique (AIS) by Arnaud Serry, Laurent Lévêque

    Published 2015-12-01
    “…It enhances maritime safety and security. AIS’ contributions are undeniable in spite of some deficiencies and technical restrictions. …”
    Get full text
    Article
  19. 5259

    Research on the format-preserving encryption modes by LIU Zhe-li, JIA Chun-fu, LI Jing-wei

    Published 2011-01-01
    “…FPE(format-preserving encryption) was discussed,and it was shown that how to reduce domain complexity was the direction of designing FPE modes.A new FPE mode named coding-then-encipher mode was proposed and its operating principle and security were described in detail,and it was pointed out that the key for this mode was finding efficient encode and decode algorithms on domain.Furthermore,a scheme under coding-then-encipher mode which can resolve FPE problem in charsn was presented,the encode and decode algorithms were described,and their efficiency were analyzed.…”
    Get full text
    Article
  20. 5260

    Value-based adoption of MDS:an empirical investigation by ZHOU Yi1, MENG Wei-dong1, DU Hui-ying2, WU Ping-yao2

    Published 2008-01-01
    “…The influence factors of customers’ behavioral intention,and constructs the regression model for the influence factors of customers behavioral intention of mobile data services(VAMDS) was analyzed.China mobile users of ease-own,GoTone and M-zone are chosen as our random surveys in Beijing,Nanjing and Chongqing.That the top three most important factors of customers behavioral intention of MDS are price,usefulness and social influence,and the security for customers’ behavioral intention validated by overseas scholars isn’t supported in the main MDS in China now.…”
    Get full text
    Article