Showing 5,581 - 5,600 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5581

    The European regulation on AI in the face of the biases and risks of algorithmic discrimination in migration contexts by Encarnación La Spina

    Published 2024-12-01
    “…While global migration contexts face tight security control and an extensive digital transition, the European regulation on AI is still too limited in scope to counteract the negative impacts of the design and training of algorithms. …”
    Get full text
    Article
  2. 5582

    15-17 May 2024, 16th Global Communication Association Conference “The Future(s) of Communication: Promises and Predicaments” by Büşra Tosun Durmuş

    Published 2024-12-01
    “…With participants from 15 countries, the event highlighted critical issues including data security, disinformation, media ethics, and the societal impacts of emerging communication technologies. …”
    Get full text
    Article
  3. 5583

    Das Andere der „erdumspannenden Gesellschaft“ by Torsten Hahn

    Published 2023-12-01
    “…The future vision described in the 1924 novel Berge Meere und Giganten begins with the global spread of a social formation that strives to export its technology and security system to even the most remote regions. There is some opposition, however: the novel presents a multitude of actors who resist planetary homogenization and integration into networks (e.g., of global transport). …”
    Get full text
    Article
  4. 5584

    Mise en marché des petits pélagiques côtiers au Sénégal : formes de valorisation et enjeux autour de la ressource by El hadj Bara Dème, Moustapha Dème

    Published 2021-12-01
    “…However, the emergence of new non-food uses and the trend of pelagic exports (growing global demand) threaten national food security and the sustainability of stocks. Unlike coastal demersal fish, where exclusive contracts are concluded between fishermen, fishmongers and fish processors, for coastal pelagics market mechanisms prevail, with landed fish being sold daily to the highest bidder. …”
    Get full text
    Article
  5. 5585

    New paradigm for Internet of things:intelligent spectrum-Internet of things by Qihui WU, Ran WANG, Zhenyan HUANG

    Published 2018-03-01
    “…The electromagnetic spectrum has become an indispensable national strategic resource in the information age.With the rapid development of the world’s integrated information network,aviation vehicles,and electromagnetic spectrum airspace operations,electromagnetic space faces three major challenges:the increasing shortage of spectrum resources,increasingly stringent spectrum security,and increasingly fierce spectrum confrontation.In order to deal with the three major challenges,the basic concepts and architecture of intelligent spectrum-Internet of things (IS-IoT) was proposed,and the key technologies and future application directions of the system was analyzed.The development of IS-IoT will provide a new paradigm for the Internet of things and a new solution to the conflict between the supply and demand of spectrum resources.…”
    Get full text
    Article
  6. 5586

    Cookie based online tracing method for cyberlockers resource by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2016-12-01
    “…In light of the non-negligible fraction accounted by the traffic flows originating from cyberlocks, it is necessary to trace them for net-work security. An efficient and scalable cookie based online cyberlockers resource tracing method was proposed, called CookieTracing. …”
    Get full text
    Article
  7. 5587

    Budget Policy of the New Federal Government by Überblick

    Published 2022-01-01
    “…The red lines of the new coalition partners — adherence to the debt brake, reform of basic security, no tax increases, green investments — were often seen as “squaring the circle”. …”
    Get full text
    Article
  8. 5588

    Ciphertext-only fault analysis of the SIMON lightweight cipher by Wei LI, Yixin WU, Dawu GU, Jiayao LI, Shan CAO, Menglin WANG, Tianpei CAI, Xiangwu DING, Zhiqiang LIU

    Published 2019-11-01
    “…The ciphertext-only fault analysis on the SIMON cipher was proposed by injecting a random nibble fault under the random nibble fault model.After injecting faults,every faulty ciphertext could be decrypted and the statistical distribution of all intermediate states were analyzed by the attackers.On the basis of the previous distinguishers of SEI,GF,MLE,MLE-SEI,GF-SEI and GF-MLE,four novel distinguishers of GF-MAP,HW-MLE,GF-HW and HW-MAP were proposed to reduce faults.The results show that the SIMON cipher cannot resist against the ciphertext-only fault analysis.It provides an important reference for security analysis of other ciphers.…”
    Get full text
    Article
  9. 5589

    Analysis of the situation and problem on the legislation of cyberspace in China by Yong-jiang XIE, Shu-li JIANG

    Published 2015-12-01
    “…The internet governance and legislation have experienced the free development,the exploration and the comprehensive stages.There are some problems about the current legislation,such as the law level is low,the high-level law is lack,the legislation is relatively scattered,legislation is lagging far behind the technology,the cur-rent law is principle and lack of the operability,legislation is heavy duty,light-rights,and so on.According to these conditions,accelerating the basic legislation,such as the cyber security law,the personal information protection act,the internet service administration law,the act of e-commerce,the e-government law,the telecommunications act,and so on was suggested,so as to build a relatively complete cyber law system.…”
    Get full text
    Article
  10. 5590

    Mutual authentication scheme based on the TPM cloud computing platform by Zhen-peng LIU, Feng-long WU, Kai-yu SHANG, Wen-lei CHAI, Xiao WANG

    Published 2012-11-01
    “…A mutual authentication scheme based on the TPM cloud computing platform was proposed to solve the problem of mutual authentication between user and cloud computing server.Trusted computing technology and traditional smart card password method were used in cloud computing service platform.The scheme completed the authentication of both sides in cloud computing,generated the session key according consulting,at the same time,verified the credibility of cloud service platform.Experiment analysis shows that our scheme can resist various kinds of possible attacks,so it is therefore more secure than other schemes.And the computing time meet the requirements of cloud computing environment.…”
    Get full text
    Article
  11. 5591

    Study on RF module in UHF OFDM node for mobile multimedia sensor network by PANG Rui-fan, JIANG Jian, WANG Ying-guan, ZHANG Hong-jun, LIU Hai-tao

    Published 2008-01-01
    “…It can be applied to very important person (VIP) motorcade video wireless monitoring system, public security emergency command system, and battlefield surveillance system, etc.…”
    Get full text
    Article
  12. 5592

    Clustering algorithm preserving differential privacy in the framework of Spark by Zhi-qiang GAO, Qing-peng LI, Ren-yuan HU

    Published 2016-11-01
    “…Aimed at the problem that traditional methods fail to deal with malicious attacks with arbitrary background knowledge during the process of massive data clustering analysis,an improved clustering algorithm, especially designed for preserving differential privacy,under the framework of Spark was proposed.Furthermore,it’s theoretically proved to meet the standard of ε-differential privacy in the framework of Spark platform.Finally,experimental results show that guaranteeing the availability of proposed clustering algorithm,the improved algorithm has an advantage over privacy protection and satisfaction in the aspect of time as well as efficiency.Most importantly,the proposed algorithm shows a good application prospect in the analysis of data clustering preserving privacy protection and data security.…”
    Get full text
    Article
  13. 5593

    Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain by Yukun NIU, Lingbo WEI, Chi ZHANG, Xia ZHANG, Vejarano Gustavo

    Published 2020-04-01
    “…In designing an access control scheme for public wireless LAN (WLAN),user privacy protection and user accountability are two conflict goals.A novel user management and access control scheme was proposed to solve this problem by utilizing the bitcoin blockchain and Intel SGX.It utilized unmodified bitcoin blockchain to manage the ownership of access credentials for users without relying on any trusted third party.It adopted Intel SGX-based mixing technology to enhance anonymity of users’ access credentials.It designed verification path rule to resolve the conflicts between the privacy-preserving and accountability objectives.The effectiveness and feasibility of the proposed scheme are also demonstrated by security analysis and performance evaluation.…”
    Get full text
    Article
  14. 5594

    Territórios africanos: colonização ímpia, descolonização cruel e globalização perversa by Romualdo Pessoa Campos Filho, Natália Müller de Deus, Maria Angélica de Sousa Santos

    Published 2021-06-01
    “…The conflicts that lead the African population to the need to flee their countries of origin to live in refugee camps are the result of historical processes that have profoundly marked the development and security conditions in African states. In order to understand and analyze the conflicts that are present in Africa today, we seek through historical research to understand the main processes that placed Africa and its population in an environment of permanent crisis: colonization, decolonization and globalization. …”
    Get full text
    Article
  15. 5595

    Constructing a Private Cloud Computing Platform Based on OpenStack by Xiaoning Li, Lei Li, Lianwen Jin, Desheng Li

    Published 2012-09-01
    “…In the end, this paper analyzes the security and flexible computing resource allocation capabilities of the private cloud platform.…”
    Get full text
    Article
  16. 5596

    A Review of Semantic Sensor Technologies in Internet of Things Architectures by Gergely Marcell Honti, Janos Abonyi

    Published 2019-01-01
    “…Intelligent sensors should be seamlessly, securely, and trustworthy interconnected to enable automated high-level smart applications. …”
    Get full text
    Article
  17. 5597

    Malicious PDF document detection based on mixed feature by Xuehui DU, Yangdong LIN, Yi SUN

    Published 2019-02-01
    “…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
    Get full text
    Article
  18. 5598

    Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm by Bin Li, Jingpeng Wang, Hailong Bao, Huiying Zhang

    Published 2014-01-01
    “…Islanding detection is essential for secure and reliable operation of microgrids. Considering the relationship between the power generation and the load in microgrids, frequency may vary with time when islanding occurs. …”
    Get full text
    Article
  19. 5599

    China’s Cooperation in Latin America: Implications for Development Assistance by Adriana Erthal Abdenur, Danilo Marcondes de Souza Neto

    Published 2013-09-01
    “…Over the past decade, Chinese cooperation in Latin America and the Caribbean has gained momentum, propelled not only by growing trade, but also by increasingly diverse political, security, technological, and cultural ties. While this cooperation has brought tangible benefits, it has also generated new dynamics of competition, including among the actors involved in development assistance. …”
    Get full text
    Article
  20. 5600

    Probability problems on random permutation by ZHANG Zhi-qiang, ZENG Ben-sheng, LI Shi-qu

    Published 2006-01-01
    “…1)were presented.When distance a and the permutation order n were prime to each other,the distribution of number of the points with distance a was also given.By these results,the cryptographic security of random permutation is analyzed,and a new explication is presented on the significance of choosing quick trickle permutation in cipher designs.…”
    Get full text
    Article