Showing 5,701 - 5,720 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 5701

    RLWE-based ciphertext-policy attribute proxy re-encryption by En ZHANG, Yaoyao PEI, Jiao DU

    Published 2018-11-01
    “…To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute encryption could shorten the key size,reduce the ciphertext space and improve the efficiency of encryption and decryption.At the same time,the linear secret sharing matrix was used as an access matrix to meet the requirements of authorized person fine-grained commissioning control and to resist the collusion between the agent and the authorized person.In addition,the proposed scheme is shown to be secure under the ring learning with errors assumption in the standard model.…”
    Get full text
    Article
  2. 5702

    Research on wormhole attacks in wireless mesh networks by FU Ying-fang1, ZHANG Xing1, ZHANG Ting1, LUAN Liang-yu3

    Published 2011-01-01
    “…In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model ac-cording to the MR-LQSR(multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh networks and wormhole attack were considered,a wormhole attack detection scheme for wireless mesh networks based on a combination of techniques,such as wormhole attack detection algorithm based on end-to-end,distributed voting,guard detection scheme and identity-based cryptosystem was proposed.Through theory analysis and experiments,the wormhole attack detection scheme not only can detect the wormhole attacker effectively but also improve the security of wireless mesh network.…”
    Get full text
    Article
  3. 5703

    Blind signature scheme based on trusted platform computation module by Wen-ting HUANG, Ling-ling TONG, Yong-jian WANG

    Published 2013-08-01
    “…Finally random oracle was used to prove the security of the scheme. Compared with the traditional scheme, the proposed scheme has better computational efficiency.…”
    Get full text
    Article
  4. 5704

    CRITICAL ARGUMENTS ABOUT READMISSION PRACTICES AND POLICIES BETWEEN EU AND TURKEY by Zühal Ünalp-çepel

    Published 2021-03-01
    “…Within the scope of the analyses, it is aimed to discuss the critical arguments on political approaches and security policies of the European Union and Turkey on migration control and elaborate why both sides preferred to solve the migration crisis through regional, and specifically, bilateral instruments.…”
    Get full text
    Article
  5. 5705

    Hybrid Intrusion Detection System for DDoS Attacks by Özge Cepheli, Saliha Büyükçorak, Güneş Karabulut Kurt

    Published 2016-01-01
    “…Distributed denial-of-service (DDoS) attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS), for detection of DDoS attacks. …”
    Get full text
    Article
  6. 5706

    Efficient attack detection and data aggregation algorithm by Hong-bing CHENG, Chun-ming RONG, Xiao HUANG, Skjalg EGGEN, Qing-kai ZENG

    Published 2012-09-01
    “…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
    Get full text
    Article
  7. 5707

    Countering detector manipulation attacks in quantum communication through detector self-testing by Lijiong Shen, Christian Kurtsiefer

    Published 2025-01-01
    “…In practical quantum key distribution systems, imperfect physical devices open security loopholes that challenge the core promise of this technology. …”
    Get full text
    Article
  8. 5708

    The Environmentally Friendly Practices to Fight Plants’ Diseases: Scope Review by Ziad B. Al-Rawashdeh

    Published 2025-01-01
    “… Plant diseases reduce the production and affect the food security. The use of synthetic chemicals affects the environment and individual health quality. …”
    Get full text
    Article
  9. 5709

    Improved method of Tor network flow watermarks based on IPD interval by Jie DU, Yongzhong HE, Ye DU

    Published 2019-08-01
    “…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
    Get full text
    Article
  10. 5710

    DYNAMIC RESPONSE OF THE LAYERING ORDER OF 2024 ALUMINUM ALLOY THIN PLATES AGAINST THE BIRD STRIKE by YUAN JiaJun

    Published 2018-01-01
    “…In the aerospace sector,foreign object damage( FOD) is a serious threat to the normal operation of aircraft and aviation security and bird strike damage is the most common. …”
    Get full text
    Article
  11. 5711

    Long-Term Remission of a Spinal Atypical Teratoid Rhabdoid Tumor in Response to Intensive Multimodal Therapy by Fahd Refai, Haneen Al-Maghrabi, Hassan Al Trabolsi, Jaudah Al-Maghrabi

    Published 2019-01-01
    “…Provided clinical and diagnostic suspicion is high, the histopathological diagnosis is relatively straightforward to secure by testing for the characteristic loss of the tumor suppressor protein SMARCB1/INI1. …”
    Get full text
    Article
  12. 5712

    Ambitions et limites du grand projet chinois des Nouvelles Routes de la soie by Emmanuel Lincot

    Published 2021-12-01
    “…What is more original is to understand China's proposal to project beyond its borders in the aim to deploy a very extensive network both in economic and security fields is a worldwide and massive global strategy for the future. …”
    Get full text
    Article
  13. 5713

    L’eau de Chartreuse, miroir réfléchissant du renouvellement des dialectiques territoriales entre villes et montagne by Bérangère Serroi, François Besancenot, Philippe Brégard, Gérard Hanus, Fabien Hobléa

    Published 2016-03-01
    “…In so doing, it analyses the new management strategies that communities have adopted and explores possible synergies against a backdrop of the power relationship between private and public management in order to move towards an approach that embraces solidarity and security of supply.…”
    Get full text
    Article
  14. 5714

    Finite Element Analysis of the Key Component of Chain- type Lifting System by Jin Jiaqi, Liang Yuan, Wang Xianrong

    Published 2015-01-01
    “…In order to study the security and reliability of chain force transmission components of note-temperature steam flooding snubbing workover machine lifting operating system,the analysis is carried out by using the finite element software,the distribution of the chain static strength stress is accurately simulated,the result of chain the maximum equivalent stress is less than the yield limit of the material is obtained,and the contact portion of the pin and sleeve is easy to wear,when worn,the chain pitch increase,the service life will be reduced with the increasing of total length of the chain. …”
    Get full text
    Article
  15. 5715

    Architecture and challenges of system models for marine data transmission networks by Shengming JIANG, Lige GE, Yanli XU

    Published 2021-07-01
    “…Marine data transmission networks are different from terrestrials in the following aspects: high dynamics and uncertainties in network boundary, network path and communication and networking resources, heterogeneities of communication media and asymmetric communication performance, complexity of marine communication network resources with limited capabilities and ability, and high complexity and mobility of marine users with low distribution densities etc.In view of the above peculiarities for communication network in the marine space, an SM for marine data transmission network was studied from the aspects of business characteristics, network composition, network characteristics and architecture, and five challenges faced by the architecture were focused on, including adaptability, intelligent networking, transparent transmission, roaming support and secure transmission.…”
    Get full text
    Article
  16. 5716
  17. 5717
  18. 5718
  19. 5719
  20. 5720

    Bateaux, plateaux, arsenaux : quels enjeux géopolitiques dans un Arctique en mutation ? by Frédéric Lasserre

    Published 2021-03-01
    “…Finally, fueled by the concern of the Arctic States to assert their control over the maritime areas that are freeing from the ice, security policies sometimes appear as a militarization of the Arctic, in particular for Russia and, for a time, for Canada. …”
    Get full text
    Article