Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5541
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01“…A dynamic migration method of critical virtual machines for multi-tenancy was proposed.Firstly,the tenants can set ratio of critical virtual machines according to tenant's security requirements,then the dynamic migration frequency of virtual machines were maximized by the coexistence time constraints between virtual machines,finally the migration cost was minimized as an object function for the virtual machines migrated to further reduce the migration cost.Simulation experiments demonstrate that the proposed approach can reduce the impact on the performance of network services and the cost of virtual machines migration,and is more suitable for large-scale network scenarios under the premise of effective defense side-channel attacks.…”
Get full text
Article -
5542
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01“…Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain.A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger Fabric platform, a typical representative of the consortium blockchain.By splitting the private key d into two parts, different roles use each private key to generate the joint signature of the anonymous certificate to achieve the separation of permissions in the process of certificate generation and solve the single point attack problem in the process of anonymous certificate tracking.The analysis shows that the improved scheme can achieve higher security than the original scheme with lower computing and storage overhead.…”
Get full text
Article -
5543
P2P network identity authentication mechanism based on trusted alliance
Published 2020-04-01“…In order to effectively solve the problems of CA's cross certification and single point of failure in traditional PKI system,a new identity authentication mechanism was proposed.Firstly,this mechanism built the basic architecture based on blockchain,and built the trusted alliance by dynamically generating trusted nodes.Secondly,the whole network unified unique identity was proposed and used a new data structure,named SRT,to store.Finally,all nodes in the network could mutual authentication through the double layer consensus mechanism.Experiments show that this mechanism can meet the query and management of massive user identity information,and ensure the efficiency and security in the identity authentication process.…”
Get full text
Article -
5544
« Monstreuses » : biotechnologies, figures et fictions féministes dans le récit bref de science-fiction
Published 2020-12-01“…» requires agreements, moves, translations and connections, but we are freeing from paranoia, segregation, borders and invaders, security policies and redeeming apocalypses.…”
Get full text
Article -
5545
Thoughts on the Digital Transformation of Teaching in Chinese Higher Education
Published 2024-01-01“…Subsequently, it puts forward coping strategies such as strengthening technical training, optimizing resource integration, innovating teaching models, enhancing data security, and promoting educational equality and inclusiveness, aiming to promote the smooth progress of digital teaching transformation in higher education.…”
Get full text
Article -
5546
Tsurumi Shunsuke et les frontières du pragmatisme, 1945-1960
Published 2024-12-01“…Less well known, however, is his philosophical work in the early part of his career, between the end of the Second World War and the renewal of the Japan-US Security Treaty. This article explores this seminal period, during which he contributed to the introduction of American pragmatism to Japan, before adopting a much more critical stance towards it. …”
Get full text
Article -
5547
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks
Published 2011-10-01“…More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. …”
Get full text
Article -
5548
Improve the robustness of algorithm under adversarial environment by moving target defense
Published 2020-08-01“…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
Get full text
Article -
5549
Lightweight integrity verification scheme for cloud based group data
Published 2016-10-01“…In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.…”
Get full text
Article -
5550
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article -
5551
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01“…SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.…”
Get full text
Article -
5552
TRUST IN THE SYSTEM OF INTERACTION OF PARTICIPANTS OF THE MARKET IN CONDUCTING CALCULATIONS WITH THE USE OF ALTERNATIVE MEANS OF PAYMENT IN THE SYSTEM OF THE FUEL AND ENERGY COMPLE...
Published 2017-07-01“…Possibilities of activization of innovative development of resource trade as one of major factors of increase in security of fuel and energy complex and all Russian economy in general are revealed.…”
Get full text
Article -
5553
Attribute-based encryption with hidden policies in the access tree
Published 2015-09-01“…The existing policies-hidden attribute-based encryption (ABE) schemes could only support a limited access structure,which resulted in weak expressiveness.A new structure of access tree was thus proposed to integrate attribute hiding and secret sharing into “and” gate,“or” gate and “threshold” gate.Then,a tree-based policies-hidden scheme was constructed by using composite order bilinear groups.Under dual system encryption,the scheme was proved to be secure.Furthermore,the analysis and experiment demonstrate that the scheme realize policies-hidden in the complex ac-cess structure without increasing the overhead of computation.As a result,it is more feasible and flexible for applica-tions.…”
Get full text
Article -
5554
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01“…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
Get full text
Article -
5555
Sovereign Debt Restructurings in Grenada: Causes, Processes, Outcomes, and Lessons Learned
Published 2018-08-01“…However, the first restructuring was not able to secure long-term debt sustainability. Grenada’s restructuring experience shows the importance of (1) establishing appropriate debt restructuring objectives; (2) committing to policy reforms and maintaining ownership of the restructuring goals; and (3) engaging closely and having clear communications with creditors.…”
Get full text
Article -
5556
Piracy around the Horn of Africa
Published 2009-09-01“…Piracy around the Horn of Africa has risen to a level serious enough for the international community to take concerted action to secure an international sea lane. However, the efforts so far have been initiated mainly by the international community while regional efforts are only just beginning. …”
Get full text
Article -
5557
Multi-biometrics fusion based on dynamic weighting of characteristic signal quality
Published 2018-03-01“…Face recognition and speaker recognition were integrated at the decision-making level.In order to cope with the influence of the external environment on the recognition result,image quality and sound quality assessment methods were introduced.By evaluating the quality of information,features with poor information quality were removed.Information quality dynamically adjusted the weight proportion of the module,and rejected individuals with low matching degree of single-mode feature recognition.Then,according to DS theory,each evidence was merged into a new body of evidence to realize user identification.The experimental results show that the fusion method which takes into account the characteristic signal quality can effectively improve the recognition accuracy and security.…”
Get full text
Article -
5558
Discussion on the common sense of the Internet of things
Published 2020-12-01“…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
Get full text
Article -
5559
Anonymous aggregator election protocol for wireless sensor networks
Published 2015-02-01“…An anonymous cluster head election protocol in clustered wireless sensor networks was proposed.The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilinear pairings was adopted to verify election results,ensuring the successful election of cluster heads.A corresponding anonymous data aggregation scheme was designed,through which data aggregation can be accomplished without revealing the identities of aggregators.Extensive analysis and simulation results show that the proposed protocol achieves anonymity,energy efficiency and security of cluster heads election simultaneously and can resist eavesdropping attacks,node compromise attacks and collusion attacks effectively.…”
Get full text
Article -
5560
Incentive mechanism enables efficient fog network
Published 2019-03-01“…In order to improve the resource utilization and service quality of the fog network,as well as ensure the reliability and security of heterogeneous fog nodes,a reasonable incentive mechanism was required.The introduction of incentive mechanism can effectively motivate the service enthusiasm of fog network equipment and reduce the malicious or selfish behavior of the equipment.Firstly,the research significance of the fog computing was proposed,and the characteristics as well as the application scenarios of fog networks were given.Secondly,the system architecture of the fog network was introduced.Then the incentive mechanism was integrated with the resource sensing technology and the task offloading technology in the fog network,and further examples were presented to show the important role of the incentive mechanism in the fog network.…”
Get full text
Article