Showing 5,301 - 5,320 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 5301

    THE PEACEFUL SETTLEMENT OF DISPUTES - FUNDAMENTAL PRINCIPLE OF PUBLIC INTERNATIONAL LAW by Roxana-Mariana POPESCU

    Published 2024-05-01
    “…Enshrined in the 1970 Declaration, under the name of the principle of peaceful settlement of international disputes, the principle obliges states to settle their disputes by peaceful means, so that peace, international security and justice are not endangered. States must act in good faith and in a spirit of cooperation to reach a swift and just solution based on international law. …”
    Get full text
    Article
  2. 5302

    Binary image steganography method based on layered embedding by Yuxiang CHENG, Weiming ZHANG, Weixiang LI, Nenghai YU

    Published 2021-10-01
    “…A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message embedding.Compared with the previous additive distortion steganography methods with fixed distortion, the proposed method combined the characteristics of binary images with only black and white pixels.Hence, it facilitated the correlation capture of pixel points and dynamic modification of distortion, improving the visual quality and steganography security of the binary image steganography.…”
    Get full text
    Article
  3. 5303

    Correlation probability indistinguishable location privacy protection algorithm by Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI

    Published 2017-08-01
    “…The attack of corre1ation probabi1ity used by the adversary in snapshot query and continuous query services were measured.Then,on account of these attacks,a privacy protection framework based on the differentia1 privacy and a 1ocation-shift scheme to achieve the indistinguishab1e of corre1ation probabi1ities was provided,and the protection effectiveness of this method was proved.At 1ast,security ana1ysis and the experiment resu1ts further verify the protection effectiveness and guarantee the execution efficiency of the proposed scheme.…”
    Get full text
    Article
  4. 5304

    Improved certificateless sequential multi-signature scheme by Hong-zhen DU, Qiao-yan WEN

    Published 2015-10-01
    “…A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown that the scheme had a drawback in the verifying algorithm,and then it overcame the drawback.But,the efficiency of the corrected scheme was greatly reduced.An efficient certificateless sequential multi-signature scheme is constructed,and the multi-signature generated by proposed scheme consists of one group element and the verification algorithm requires only 2 bilinear pairings.…”
    Get full text
    Article
  5. 5305

    Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos by Shu-ying Wang, Jian-feng Zhao, Xiao-yan Wang, Li-tao Zhang

    Published 2019-01-01
    “…Finally, an image encryption algorithm is proposed based on the fractional-order memristive hyperchaos. Security and performance analysis indicates that the proposed chaos-based image encryption algorithm is highly resistant to statistical attacks.…”
    Get full text
    Article
  6. 5306

    Key management scheme with private key self-healing ability in DTN by De-quan LI, Xi-yong ZHANG, Ting-ting ZHANG, Guan-jun GUO

    Published 2017-04-01
    “…Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing clustering key was management scheme.The scheme can not only accomplish the distribution of the private keys of node and update,but also can self-heal the old time private keys.Security and efficiency analysis show that the scheme is particularly suitable for large network latency,intermittent connection DTN network.…”
    Get full text
    Article
  7. 5307

    Generalization and improvement of Nyberg-Rueppel message recovery blind signatures by HUANG Zhen-jie1, WANG Yu-min2, CHEN Ke-fei1

    Published 2005-01-01
    “…A generalized Nyberg-Rueppel message recovery blind signature scheme was presented,from which the scheme proposed by Camenisch et al and two new schemes could be obtained.One of these two new schemes was an efficiently improved scheme without computing any inverse while Camenisch et al’s scheme needs.Moreover,using the padding technique and hash function,a provably secure message recovery blind signature scheme,against adaptive chosen-message attack in random oracle model and generic group model,was proposed.…”
    Get full text
    Article
  8. 5308

    Quantum secret sharing with graph states based on Chinese remainder theorem by Jianwu LIANG, Xiaoshu LIU, Zi CHENG

    Published 2018-10-01
    “…Based on the topological features of quantum graph states,a quantum secret sharing scheme based on Chinese remainder theorem with a vivid graphic description was proposed.The dealer extracts sub-secrets according to Chinese remainder theorem over finite field,which were imbedded with quantum graph states and transmitted to the legal participants with unitary operations.Group-recovery protocols were used in the secret recovering processing through rebuilding sub-secrets among legal cooperative participants.Analysis shows that it could provide better security and capability of the information.…”
    Get full text
    Article
  9. 5309

    GENERATION OF DECELERATION PULSES OF THE TROLLEY IN CHILD RESTRAINT SYSTEMS’ DYNAMIC TESTS BASED ON SIMULATIONS AND EXPERIMENTAL VALIDATIONS by ZHE WEI

    Published 2021-10-01
    “… As one of devices for passive safety, child restraint system remains a positive factor in securing the safety of child occupants in vehicles’ collisions. …”
    Get full text
    Article
  10. 5310

    MILESTONES OF PERSONNEL MANAGEMENT SCIENCE IN RUSSIA by Y. Proshina

    Published 2016-02-01
    “…Finally, there is modern HR service function list presented. Such a list secure successful enterprises functioning for today.…”
    Get full text
    Article
  11. 5311

    Belize’s 2016–17 Sovereign Debt Restructuring – Third Time Lucky? by Tamon Asonuma, Michael G. Papaioannou, Eriko Togo, Bert van Selm

    Published 2020-12-01
    “…While providing liquidity relief and partially addressing long-term debt sustainability concerns, the restructuring will need to be underpinned by ambitious fiscal consolidation and growth-enhancing structural reforms to secure durable gains and avoid future debt distress situations.…”
    Get full text
    Article
  12. 5312

    New pseudorandom functions based on SIS by He-feng CHEN, Wen-ping MA, Sheng GAO, Cheng-li ZHANG

    Published 2014-10-01
    “…Pseudorandom functions are vital tools in the construction of cryptographic primitives.Under the hard assumption of SIS (short integer solution),two lattice-based pseudorandom functions are proposed.The first one has parallel structure by the ideal of tree-like pseudorandom synthesizer,and the second one is serial structure whose public key size is reduced.Both constructions have small modulus and provable security.Compared with A Banerjer,C Peikert and A Rosen’s construction (EUROCRYPT 2012),their key sizes are asymptotically smaller,and efficiency are improved by avoiding the “rounding” technology.…”
    Get full text
    Article
  13. 5313

    Дети-мигранты: современные акценты научных исследований в России by Irina Simaeva

    Published 2016-09-01
    “…It indicates other necessary areas of international research and development in migrant children, a stable identification with the host country, and support for the psychological feeling of security to counter involvement in terrorism. …”
    Get full text
    Article
  14. 5314

    Privacy Protection for Personal Health Device Communication and Healthcare Building Applications by Soon Seok Kim, Yong Hee Lee, Jong Mo Kim, Deok Seok Seo, Gwang Hee Kim, Yoon Seok Shin

    Published 2014-01-01
    “…We believe it will be a highly valuable resource for dealing with basic data because it suggests an additional standard for security with the Continua Health Alliance or related international groups in the future.…”
    Get full text
    Article
  15. 5315

    L’Union du Maghreb ou l’invincible espoir by El Mehdi Lamrani

    Published 2013-10-01
    “…It remains an imperative of regional stability, which not only ensures economic prosperity and stability with its security implications for the Mediterranean north shore, but it represents a geopolitical pole contributing to the preservation of global equilibrium.…”
    Get full text
    Article
  16. 5316

    Design pattern of industrial cloudin small-medium cities by Ling LI

    Published 2017-05-01
    “…Combined with the current status and characteristics of the development of information technology in small-medium cities in China and arrounding the important topic of industrial cloud development in small-medium cities,the latest models of industrial cloud design was put forward,including the system architecture,function equipment,service ability and cloud security of industrial cloud in small-medium cities.The basic principles,the main contents,the technical route,the reference index and the business interface of the industrial cloud design in small-medium cities was expounded,providing some reference and guidance for people involved.…”
    Get full text
    Article
  17. 5317

    Design ideas of the top layer of the mine Internet of things by Enjie DING, Qingsong HU

    Published 2018-03-01
    “…The flourishing development of the mine network requires the technology of the mine Internet of things from the top layer.The top layer design mine networking technology completed in 2017 by the State Administration of Production Safety Supervision was read.From the aspects of the design ideas,development status,challenges,strategic objectives,the key technology and implementation route and security needed,the technical background and core contents of top layer design were analyzed.It will provide some references for researchers and technology managers in mining industry to read,understand and use “top layer design”.…”
    Get full text
    Article
  18. 5318

    Verifiably private outsourcing scheme for multivariate polynomial evaluation by Yan-li REN, Da-wu GU, Jian-xing CAI, Chun-shui HUANG

    Published 2015-08-01
    “…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
    Get full text
    Article
  19. 5319

    Les limites de la culture de guerre dans l’Italie fasciste durant la Seconde Guerre mondiale by Philippe Foro

    Published 2011-05-01
    “…It was seen as the ultimate ordeal through which the «new man», imagined by the regime, had to go through in order to secure a glorious future for the fascist revolution. …”
    Get full text
    Article
  20. 5320

    Keeping a Household Inventory and Protecting Valuable Records by Regina Fegan, Michael T. Olexa

    Published 2003-07-01
    “…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
    Get full text
    Article