Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5461
International Cooperation and Indonesia’s Geopolitical Perspective in Indo-Pacific
Published 2025-01-01“…In other words, regional development through international cooperation will increase regional stability so as to encourage various economic, political and security activities that not only reduce political friction, but also provide strategic advantages for every actor who has an interest in the Indo-Pacific. …”
Get full text
Article -
5462
Data integrity verification based on model cloud federation of TPA
Published 2018-08-01“…Aiming at the untrustworthiness of third-party auditor (TPA) in the publicity verification model,a data integrity verification model based on the cloud federation of TPA was proposed.Firstly,the cloud federation of TPA’s architecture was designed and the main functional components and function of the system platform was defined.The federation could manage and control the TPA cloud members.Secondly,TPA was designed in detail by using trusted computing technology and blockchain technology to ensure the credibility of the TPA execution environment and workflow.Finally,the data integrity verification model was built by using cloud federation of TPA.The correctness,security and effectiveness of the model were analyzed theoretically and experimentally.…”
Get full text
Article -
5463
Les supermarchés au Mexique et dans la Zone Métropolitaine de Mexico
Published 2022-06-01“…In the case of Mexico City, the situation of oligopoly by the company Wal-Mart constitutes a risk to food sovereignty and security of the city.…”
Get full text
Article -
5464
Globalisation in Crisis?
Published 2021-11-01“…Germany’s close economic ties with the world also mean that disruptions in supply chains or slumps in demand during pandemics are to be viewed extremely negatively and appropriate strategies for global health security should be pursued.…”
Get full text
Article -
5465
Approach for topology partitioning in parallel network simulation
Published 2006-01-01“…To improve the usability and running efficiency of the parallel network simulation,an approach for topology partitioning based on load estimation was realized: first,the relative load values of nodes and links,estimated according to their core levels in the topology map,were treated as their weights;then,the simulation task was partitioned by the graph partitioning tool.Experiments showed that this partitioning method could improve the performance of simulation by 16.4% compared to the partitioning method with no weights.Simulation of worms based on the real topology gathered via network measurement proves that the partitioning method is suitable for real large-scale network topology and can be used to simulate large-scale network security incidents.…”
Get full text
Article -
5466
Design of Satellite Internet Defense System Based on Mobile Target Defense
Published 2024-12-01“…While satellite Internet promote information inter connectivity, they also raise increasingly complex security issues. This article introduced mobile target defense as proactive defense measure into the cyber protection of satellite Internet. …”
Get full text
Article -
5467
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01“…Based on provable data possession(PDP)model,a more perfect data integrity checking model for mobile cloud computing was proposed,in which there was an additional proxy party with stronger computing power to help the mobile users to calculate the block tags.Furthermore,for the proposed model,an identity-based proxy signature PDP(IBPS-PDP)protocol was presented.By using identity-based signatures,the system did not need to manage public key certificates and further the users did not need to take the additional computations to verify the other’s certificates yet.Finally,the security of the proposed IBPS-PDP protocol is proved in the random oracle model.…”
Get full text
Article -
5468
Enjeux de la mutation des techniques artisanales sur la formalisation de l’exploitation de l’or au Burkina Faso
Published 2021-12-01“…On the basis of documentary research and field surveys in the commune of Kampti in May 2018 and December 2019, we show that despite the willingness of actors to secure their investments through formalization, they come up against unfavorable institutional and legal realities. …”
Get full text
Article -
5469
Marchés institutionnels et soutien à l’agriculture familiale au Brésil : étude de cas de producteurs insérés dans le programme d’alimentation scolaire
Published 2014-05-01“…In Brazil, recent improvements of the National School Feeding Programme (PNAE), which articulates support for the family farm and food security in vulnerable populations, indicate an evolution towards relocalized food systems. …”
Get full text
Article -
5470
On Max-Plus Algebra and Its Application on Image Steganography
Published 2018-01-01“…The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.…”
Get full text
Article -
5471
Encryption of 3D or Higher-Dimensional Images: A Review
Published 2024-12-01“…Precisely, the following classes of images are considered: light field images, point clouds, and 3D medical images. The security and performance aspects of the encryption schemes for images are analyzed. …”
Get full text
Article -
5472
Liturgiese sang op die kruispad tussen tradisie en vernuwing
Published 1997-12-01“…A well-founded insight in the following aspects will secure a sound balance between tradition and renewal in a present day liturgical theology and practice: the historical background of the relationship between liturgy and singing, the liturgical function of singing, liturgical communication through singing, as well as a hymnological aesthetics and liturgical ethics. …”
Get full text
Article -
5473
Incertezza e cambiamento climatico nell’era dell’Antropocene
Published 2017-07-01“…Climate change appears as a major driver of identity crisis, affecting changes at local and global level in terms of spaces, security, livelihood and weather. The prevailing narration on climate change describes unfamiliar scenarios struck by exceptional events, that rarely can be connected with personal experiences. …”
Get full text
Article -
5474
Survivability model for reconfigurable service carrying network based on the stochastic Petri net
Published 2016-03-01“…Aiming at the defect that the security attribute of RSCN couldn't be described with measurement,a survivabil-ity model for RSCN was proposed based on the stochastic Petri net.Firstly,a non-Markovian stochastic Petri net for RSCN was proposed,and then the state schematics was educed based on the FCFS fault repair policy subsequently.Fina-ly,the survivability model was concluded based on the probability equation of system state by importing supplementary variable.The model was analyzed and validated for validity through emu ational experiments.The emulational results show that the comparability between the computed-results of model and emulational results is good,and the model can be used to discribe the survivability for RSCN.…”
Get full text
Article -
5475
Fair mobile payment protocol based on PPV
Published 2008-01-01“…The protocol satisfied fairness, non-repudiation, atomic, authentication, and security. It is also simpler, and suitable for a wide range of application.…”
Get full text
Article -
5476
Research on WiFi Penetration Testing with Kali Linux
Published 2021-01-01“…The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network.…”
Get full text
Article -
5477
Non-interference trusted model based on processes
Published 2009-01-01“…A novel abstract model for the design of trusted computing platform system was proposed.By using the basic idea of non-interference theory as reference and introduces the reasoning method of process algebra, thus abstracting the system as processes, actions, states and outputs, and giving the formal definition of the trusted of process running.Process isolation trusted theorem was verified formally.Furthermore, by associating process with system state, the definition and the theorem of system running trusted was proposed.The model was established by logic reasoning and independent of special security mechanism and enforcement.The trust of the running system can be realized by any method which satisfies the conditions of the model.…”
Get full text
Article -
5478
Trayectorias contemporáneas del miedo en América Latina
Published 2017-12-01“…The exceptional centrality acquired by the speech on security in Latin America can be observed. As a correlate to this process, we witness the gradual alteration in the dynamics of production and trafficking of narcotic drugs throughout the continent, which has involved the opening of a period of violence unprecedented by virtue of its size, forms of expression, as well as the social repercussions that it entails.…”
Get full text
Article -
5479
Parental Influences on Children's Self-Regulation of Energy Intake: Insights from Developmental Literature on Emotion Regulation
Published 2012-01-01“…Additionally, sources of variation in parental influences on regulation are examined, including parenting style, child temperament, and child-parent attachment security. Parallels in the nature of parents' role in socializing children's regulation of emotions and energy intake are examined. …”
Get full text
Article -
5480
An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm
Published 2014-01-01“…The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.…”
Get full text
Article