Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5281
Correction to: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
Published 2025-02-01Get full text
Article -
5282
-
5283
Editorial: Cybersecurity and artificial intelligence: advances, challenges, opportunities, threats
Published 2025-01-01Get full text
Article -
5284
Research progress on dynamic hopping technology for network layer
Published 2021-12-01“…Firstly, the basic concept of network layer hopping technology was introduced and the security threats it faced were given.Then, two type of models and communication methods of network layer hopping technology based on traditional networks and software-defined networks were given.And the network layer hopping technology was classified from three aspects of hopping attributes, the method of hopping realization and the method of hopping trigger, two evaluation models of network layer hopping were given.Finally, the problems that still exist in the network layer hopping technology and the corresponding development direction were summarized.…”
Get full text
Article -
5285
Relying on the Information
Published 2013-11-01“…The editorial discusses internet filtering in the light of the optional internet packages for users, namely Family, Standard, Kids and Domestic, to be offered by the Information Technologies Board with the "Secure Internet Law" to take effect on August 22, 2011. …”
Get full text
Article -
5286
Botanický ústav Německé univerzity v Praze a jeho výukové tabule
Published 2025-01-01“…In other words, they had to be familiar with the contemporary bureaucratic machinery and deal with it in a way that secured the maximum of what was possible for their institute. …”
Get full text
Article -
5287
Study on Chaotic Fault Tolerant Synchronization Control Based on Adaptive Observer
Published 2014-01-01“…Finally, the proposed synchronization schemes are applied to secure communication system successfully. The experimental results demonstrate that the employed observer can manage real-time fault diagnosis and parameter identification as well as states tracing of the master system, and so the synchronization of master system and slave system is achieved.…”
Get full text
Article -
5288
Cryptography algorithm for wireless channel of CBTC system
Published 2011-01-01“…As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.…”
Get full text
Article -
5289
PUBLIC-PRIVATE PARTNERSHIP IN THE EAEU TRANSIT ECONOMY: RUSSIA AND CENTRAL ASIA STATES
Published 2018-11-01“…“Public-Private Partnership – The Basis of Innovative Development and Security in The Transit Economy” / Foreword and ed. by V. …”
Get full text
Article -
5290
Reflections on the development and construction of space-ground integration information network
Published 2017-12-01“…When maintaining and expanding national interests,our country’s information network has always been faced with the problem of “covering beyond its control,incompatible with information,slow in response to services and having security risks”.Building a space-ground integration information network is an effective way to deal with the challenges.Based on this,the status quo and trend of the development of the integrated world-wide information network system at home and abroad were analyzed.The concept,key technologies and implementation strategies of a global integration of information network architecture were given.…”
Get full text
Article -
5291
Block cipher based on T-shaped cellular automata
Published 2009-01-01“…In order to overcome the defect on insecurity of block cipher with few reversible cellular automata, T-shaped cellular automata was proposed, which needed two initial states and applied their characteristics to construct more re-versible cellular automata.A new encryption system based on this class of self-reversible cellular automata was designed.Experiments show that block cipher based on reversible cellular automata not only achieves a better avalanche effect but also improves the security of the applications of cellular automata in cryptography, especially by using pseudo random sequences in the beginning of encryption.…”
Get full text
Article -
5292
Dynamic spectrum sharing access technology based on blockchain
Published 2020-06-01“…The blockchain technology written in the smart contract has advantages of the enabling intelligent settlement,value transfer and resource sharing,which provides a new secure and trusted platform for the dynamic spectrum sharing system.Firstly,the application of blockchain technology in dynamic spectrum sharing was summarized,considering the requirements of spectrum sharing.The key problems that need to be solved when applying blockchain to the large-scale spectrum sharing system were discussed.After that,the key challenges were analyzed in depth,and corresponding key technologies and possible solutions were provided to the above problems.…”
Get full text
Article -
5293
Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation
Published 2016-12-01“…The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection scheme based on the spatiotemporal correlation was proposed. Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories, thereby pro-tecting the user's trajectory privacy. …”
Get full text
Article -
5294
Analysis of Network Demand and Research on the Key Technology for Integration of 5G and Wi-Fi
Published 2014-08-01“…In the networking of 5G and Wi-Fi, integration of network application scene and fusion networking technology were introduced to be the inevitable demand, no-sense authentication, network security, green communication were proposed to become the key technical indicators.…”
Get full text
Article -
5295
L’appel à l’ennemi : l’anticommunisme à l’École supérieure de guerre au Brésil (1954-1964)
Published 2021-03-01“…The focus is on the conferences given by judges, academics and psychiatrists who saw Communism as a political doctrine and a threat to national security. Opposing Communism helped pull these elites together and shaped the central axis of the new doctrine that both civilians and military officers were elaborating at the Superior War College. …”
Get full text
Article -
5296
Citizen’s Income and the Future of the Welfare State
Published 2022-02-01“…Abstract The authors discuss the reform of basic security in the direction of a “citizen’s income” in the coalition agreement of the new “traffic light coalition” at the federal level against the background of fundamental considerations on the future of the welfare state, including those from the “Schleswig-Holstein Future Laboratory”. …”
Get full text
Article -
5297
Technology and Application of High-Capacity USIM Card
Published 2015-03-01“…Compared to traditional SIM card, the high-capacity USIM card has higher transmission rates, larger storage space, and data security storage. The structure and functions of supporting client and management platform were discussed. …”
Get full text
Article -
5298
Interior Design of Administrative Buildings and Their Role in Achieving the Effective Performance of the User
Published 2022-03-01“…Using environmental control systems (air conditioning، sound control and fire detection systems)، they play an effective role In changing the inner atmosphere of spaces، it is also a key factor for psychological well-being،Reassurance (safety and security)، which in turn is reflected in the nature of the functionality of users within the internal space. …”
Get full text
Article -
5299
Suwerenność technologiczna - teoretyczna i analityczna konceptualizacja pojęcia w obszarze badań społecznych
Published 2024-11-01“…This article is an effort to implement the concept and improve the perception of the policy of technological sovereignty into the properties of the cognitive category of security science and political science. Under this premise, the theoretical and analytical designators extracted in the course of analysis allow the construction of a research operative. …”
Get full text
Article -
5300
Sparse Matrix for ECG Identification with Two-Lead Features
Published 2015-01-01“…Electrocardiograph (ECG) human identification has the potential to improve biometric security. However, improvements in ECG identification and feature extraction are required. …”
Get full text
Article