Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5701
RLWE-based ciphertext-policy attribute proxy re-encryption
Published 2018-11-01“…To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute encryption could shorten the key size,reduce the ciphertext space and improve the efficiency of encryption and decryption.At the same time,the linear secret sharing matrix was used as an access matrix to meet the requirements of authorized person fine-grained commissioning control and to resist the collusion between the agent and the authorized person.In addition,the proposed scheme is shown to be secure under the ring learning with errors assumption in the standard model.…”
Get full text
Article -
5702
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01“…In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model ac-cording to the MR-LQSR(multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh networks and wormhole attack were considered,a wormhole attack detection scheme for wireless mesh networks based on a combination of techniques,such as wormhole attack detection algorithm based on end-to-end,distributed voting,guard detection scheme and identity-based cryptosystem was proposed.Through theory analysis and experiments,the wormhole attack detection scheme not only can detect the wormhole attacker effectively but also improve the security of wireless mesh network.…”
Get full text
Article -
5703
Blind signature scheme based on trusted platform computation module
Published 2013-08-01“…Finally random oracle was used to prove the security of the scheme. Compared with the traditional scheme, the proposed scheme has better computational efficiency.…”
Get full text
Article -
5704
CRITICAL ARGUMENTS ABOUT READMISSION PRACTICES AND POLICIES BETWEEN EU AND TURKEY
Published 2021-03-01“…Within the scope of the analyses, it is aimed to discuss the critical arguments on political approaches and security policies of the European Union and Turkey on migration control and elaborate why both sides preferred to solve the migration crisis through regional, and specifically, bilateral instruments.…”
Get full text
Article -
5705
Hybrid Intrusion Detection System for DDoS Attacks
Published 2016-01-01“…Distributed denial-of-service (DDoS) attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS), for detection of DDoS attacks. …”
Get full text
Article -
5706
Efficient attack detection and data aggregation algorithm
Published 2012-09-01“…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
Get full text
Article -
5707
Countering detector manipulation attacks in quantum communication through detector self-testing
Published 2025-01-01“…In practical quantum key distribution systems, imperfect physical devices open security loopholes that challenge the core promise of this technology. …”
Get full text
Article -
5708
The Environmentally Friendly Practices to Fight Plants’ Diseases: Scope Review
Published 2025-01-01“… Plant diseases reduce the production and affect the food security. The use of synthetic chemicals affects the environment and individual health quality. …”
Get full text
Article -
5709
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01“…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
Get full text
Article -
5710
DYNAMIC RESPONSE OF THE LAYERING ORDER OF 2024 ALUMINUM ALLOY THIN PLATES AGAINST THE BIRD STRIKE
Published 2018-01-01“…In the aerospace sector,foreign object damage( FOD) is a serious threat to the normal operation of aircraft and aviation security and bird strike damage is the most common. …”
Get full text
Article -
5711
Long-Term Remission of a Spinal Atypical Teratoid Rhabdoid Tumor in Response to Intensive Multimodal Therapy
Published 2019-01-01“…Provided clinical and diagnostic suspicion is high, the histopathological diagnosis is relatively straightforward to secure by testing for the characteristic loss of the tumor suppressor protein SMARCB1/INI1. …”
Get full text
Article -
5712
Ambitions et limites du grand projet chinois des Nouvelles Routes de la soie
Published 2021-12-01“…What is more original is to understand China's proposal to project beyond its borders in the aim to deploy a very extensive network both in economic and security fields is a worldwide and massive global strategy for the future. …”
Get full text
Article -
5713
L’eau de Chartreuse, miroir réfléchissant du renouvellement des dialectiques territoriales entre villes et montagne
Published 2016-03-01“…In so doing, it analyses the new management strategies that communities have adopted and explores possible synergies against a backdrop of the power relationship between private and public management in order to move towards an approach that embraces solidarity and security of supply.…”
Get full text
Article -
5714
Finite Element Analysis of the Key Component of Chain- type Lifting System
Published 2015-01-01“…In order to study the security and reliability of chain force transmission components of note-temperature steam flooding snubbing workover machine lifting operating system,the analysis is carried out by using the finite element software,the distribution of the chain static strength stress is accurately simulated,the result of chain the maximum equivalent stress is less than the yield limit of the material is obtained,and the contact portion of the pin and sleeve is easy to wear,when worn,the chain pitch increase,the service life will be reduced with the increasing of total length of the chain. …”
Get full text
Article -
5715
Architecture and challenges of system models for marine data transmission networks
Published 2021-07-01“…Marine data transmission networks are different from terrestrials in the following aspects: high dynamics and uncertainties in network boundary, network path and communication and networking resources, heterogeneities of communication media and asymmetric communication performance, complexity of marine communication network resources with limited capabilities and ability, and high complexity and mobility of marine users with low distribution densities etc.In view of the above peculiarities for communication network in the marine space, an SM for marine data transmission network was studied from the aspects of business characteristics, network composition, network characteristics and architecture, and five challenges faced by the architecture were focused on, including adaptability, intelligent networking, transparent transmission, roaming support and secure transmission.…”
Get full text
Article -
5716
-
5717
Periodic Solutions of a Lotka-Volterra System with Delay and Diffusion
Published 2012-01-01Get full text
Article -
5718
-
5719
Computer-Aided Design of Elliptically Focused Bootlace Lens for Multiple Beams
Published 2007-01-01Get full text
Article -
5720
Bateaux, plateaux, arsenaux : quels enjeux géopolitiques dans un Arctique en mutation ?
Published 2021-03-01“…Finally, fueled by the concern of the Arctic States to assert their control over the maritime areas that are freeing from the ice, security policies sometimes appear as a militarization of the Arctic, in particular for Russia and, for a time, for Canada. …”
Get full text
Article