Showing 5,281 - 5,300 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 5281
  2. 5282
  3. 5283
  4. 5284

    Research progress on dynamic hopping technology for network layer by Weizhen HE, Fucai CHEN, Jie NIU, Jinglei TAN, Shumin HUO, Guozhen CHENG

    Published 2021-12-01
    “…Firstly, the basic concept of network layer hopping technology was introduced and the security threats it faced were given.Then, two type of models and communication methods of network layer hopping technology based on traditional networks and software-defined networks were given.And the network layer hopping technology was classified from three aspects of hopping attributes, the method of hopping realization and the method of hopping trigger, two evaluation models of network layer hopping were given.Finally, the problems that still exist in the network layer hopping technology and the corresponding development direction were summarized.…”
    Get full text
    Article
  5. 5285

    Relying on the Information by TK YAYIN KURULU

    Published 2013-11-01
    “…The editorial discusses internet filtering in the light of the optional internet packages for users, namely Family, Standard, Kids and Domestic, to be offered by the Information Technologies Board with the "Secure Internet Law" to take effect on August 22, 2011. …”
    Get full text
    Article
  6. 5286

    Botanický ústav Německé univerzity v Praze a jeho výukové tabule by Jana Ratajová

    Published 2025-01-01
    “…In other words, they had to be familiar with the contemporary bureaucratic machinery and deal with it in a way that secured the maximum of what was possible for their institute. …”
    Get full text
    Article
  7. 5287

    Study on Chaotic Fault Tolerant Synchronization Control Based on Adaptive Observer by Dongming Chen, Xinyu Huang, Tao Ren

    Published 2014-01-01
    “…Finally, the proposed synchronization schemes are applied to secure communication system successfully. The experimental results demonstrate that the employed observer can manage real-time fault diagnosis and parameter identification as well as states tracing of the master system, and so the synchronization of master system and slave system is achieved.…”
    Get full text
    Article
  8. 5288

    Cryptography algorithm for wireless channel of CBTC system by WANG Chao1, LIU Li-li1, NIU Zhi-hua2, SHI Xiang-yong1, ZHANG Huan-guo3

    Published 2011-01-01
    “…As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y-coordinate with more security.In addition,compared with the traditional ECC,it has faster computing speed and can effectively resist the timing attack and energy attack.The new Montgomery-form ECC algorithm has accelerated current ECC encoding speed and would make great improvement to the implementation of ECC in CBTC and other wireless communication.…”
    Get full text
    Article
  9. 5289

    PUBLIC-PRIVATE PARTNERSHIP IN THE EAEU TRANSIT ECONOMY: RUSSIA AND CENTRAL ASIA STATES by E. V. Pak

    Published 2018-11-01
    “…“Public-Private Partnership – The Basis of Innovative Development and Security in The Transit Economy” / Foreword and ed. by V. …”
    Get full text
    Article
  10. 5290

    Reflections on the development and construction of space-ground integration information network by Wei WU, Peng QIN, Xu FENG, Haijiao LIU, Zhaoxiang HUANG

    Published 2017-12-01
    “…When maintaining and expanding national interests,our country’s information network has always been faced with the problem of “covering beyond its control,incompatible with information,slow in response to services and having security risks”.Building a space-ground integration information network is an effective way to deal with the challenges.Based on this,the status quo and trend of the development of the integrated world-wide information network system at home and abroad were analyzed.The concept,key technologies and implementation strategies of a global integration of information network architecture were given.…”
    Get full text
    Article
  11. 5291

    Block cipher based on T-shaped cellular automata by WU Ying-zhi1, HAO Li-bo2, CHEN Ju-hua1

    Published 2009-01-01
    “…In order to overcome the defect on insecurity of block cipher with few reversible cellular automata, T-shaped cellular automata was proposed, which needed two initial states and applied their characteristics to construct more re-versible cellular automata.A new encryption system based on this class of self-reversible cellular automata was designed.Experiments show that block cipher based on reversible cellular automata not only achieves a better avalanche effect but also improves the security of the applications of cellular automata in cryptography, especially by using pseudo random sequences in the beginning of encryption.…”
    Get full text
    Article
  12. 5292

    Dynamic spectrum sharing access technology based on blockchain by Wei WANG, Zuguang LI, Qihui WU

    Published 2020-06-01
    “…The blockchain technology written in the smart contract has advantages of the enabling intelligent settlement,value transfer and resource sharing,which provides a new secure and trusted platform for the dynamic spectrum sharing system.Firstly,the application of blockchain technology in dynamic spectrum sharing was summarized,considering the requirements of spectrum sharing.The key problems that need to be solved when applying blockchain to the large-scale spectrum sharing system were discussed.After that,the key challenges were analyzed in depth,and corresponding key technologies and possible solutions were provided to the above problems.…”
    Get full text
    Article
  13. 5293

    Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation by Kai-yue LEI, Xing-hua LI, Hai LIU, Zhuo-xiong PEI, Jian-feng MA, Hui LI

    Published 2016-12-01
    “…The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection scheme based on the spatiotemporal correlation was proposed. Security analysis shows that the presented scheme successfully confuses the user's real trajectory with dummy trajectories, thereby pro-tecting the user's trajectory privacy. …”
    Get full text
    Article
  14. 5294

    Analysis of Network Demand and Research on the Key Technology for Integration of 5G and Wi-Fi by Ming Liu, Zhizhong Zhang, Fang Cheng

    Published 2014-08-01
    “…In the networking of 5G and Wi-Fi, integration of network application scene and fusion networking technology were introduced to be the inevitable demand, no-sense authentication, network security, green communication were proposed to become the key technical indicators.…”
    Get full text
    Article
  15. 5295

    L’appel à l’ennemi : l’anticommunisme à l’École supérieure de guerre au Brésil (1954-1964) by Rodrigo Nabuco de Araujo

    Published 2021-03-01
    “…The focus is on the conferences given by judges, academics and psychiatrists who saw Communism as a political doctrine and a threat to national security. Opposing Communism helped pull these elites together and shaped the central axis of the new doctrine that both civilians and military officers were elaborating at the Superior War College. …”
    Get full text
    Article
  16. 5296

    Citizen’s Income and the Future of the Welfare State by Michael Opielka, Wolfgang Strengmann-Kuhn

    Published 2022-02-01
    “…Abstract The authors discuss the reform of basic security in the direction of a “citizen’s income” in the coalition agreement of the new “traffic light coalition” at the federal level against the background of fundamental considerations on the future of the welfare state, including those from the “Schleswig-Holstein Future Laboratory”. …”
    Get full text
    Article
  17. 5297

    Technology and Application of High-Capacity USIM Card by Shuanghe Dong, Binfeng Yan, Bo Hu, Xiaohua Guo

    Published 2015-03-01
    “…Compared to traditional SIM card, the high-capacity USIM card has higher transmission rates, larger storage space, and data security storage. The structure and functions of supporting client and management platform were discussed. …”
    Get full text
    Article
  18. 5298

    Interior Design of Administrative Buildings and Their Role in Achieving the Effective Performance of the User by Aisha Samir Safwat, Hisham Zamil Hamdan

    Published 2022-03-01
    “…Using environmental control systems (air conditioning، sound control and fire detection systems)، they play an effective role In changing the inner atmosphere of spaces، it is also a key factor for psychological well-being،Reassurance (safety and security)، which in turn is reflected in the nature of the functionality of users within the internal space. …”
    Get full text
    Article
  19. 5299

    Suwerenność technologiczna - teoretyczna i analityczna konceptualizacja pojęcia w obszarze badań społecznych by Piotr Lewandowski

    Published 2024-11-01
    “…This article is an effort to implement the concept and improve the perception of the policy of technological sovereignty into the properties of the cognitive category of security science and political science. Under this premise, the theoretical and analytical designators extracted in the course of analysis allow the construction of a research operative. …”
    Get full text
    Article
  20. 5300

    Sparse Matrix for ECG Identification with Two-Lead Features by Kuo-Kun Tseng, Jiao Luo, Robert Hegarty, Wenmin Wang, Dong Haiting

    Published 2015-01-01
    “…Electrocardiograph (ECG) human identification has the potential to improve biometric security. However, improvements in ECG identification and feature extraction are required. …”
    Get full text
    Article