Showing 5,921 - 5,940 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 5921

    Enhanced cloud storage access control scheme based on attribute by De-hua NIU, Jian-feng MA, Zhuo MA, Chen-nan LI, Lei WANG

    Published 2013-08-01
    “…In order to ensure the security of data and privacy in cloud storage, an enhanced cloud storage access control solution based on attribute was proposed. …”
    Get full text
    Article
  2. 5922

    An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users by Keita Emura, Atsuko Miyaji, Kazumasa Omote

    Published 2014-01-01
    “…To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.…”
    Get full text
    Article
  3. 5923

    Stratégies de partage et diffusion de données publiques environnementales by Sandra Nicolle, Maya Leroy

    Published 2013-09-01
    “…On the contrary, in French Guiana, there is a reduction of information distribution concerning gold mining impacts, linked to an increased involvement of national security state services in the monitoring process.…”
    Get full text
    Article
  4. 5924

    Slovenian Complementary Health Insurance as a Service of General Economic Interest by Bruno Nikolić

    Published 2015-03-01
    “… Slovenian legislation defines complementary health insurance as an activity of the public interest, which represents an inseparable and essential element of healthcare system and as such pursues objectives identical to those of compulsory health insurance – financial security of population against high healthcare expenses and appropriate and fair access to efficient and quality healthcare. …”
    Get full text
    Article
  5. 5925

    Research at flat underlying network architecture of campus by Chu-jian LIN, Si-hai ZHANG

    Published 2014-10-01
    “…By systematic analysis of the status quo on the campus network,via deployment of BRAS and high-density switches,we deployed a flat network core,by deployment of accounting system through a bypass way,using IPOE access technology,combined with local forwarding wireless networking,assisted with linkage logging system,we achieved a unified user access certification,and we optimized the network boundary by integrating of global security policy,strategies for Internet traffic optimization base on application protocols and the deployment of caching system.Practice shows,flat underlying network architecture improves the network performance,meets the inherent requirements of campus network,while also improves users’ experience.Flat network architecture is feasible for campus network.…”
    Get full text
    Article
  6. 5926

    Optimal cash holding model based on minimization of ruin probability by Zhengyan Wang, Yan Zhang, Peibiao Zhao

    Published 2024-01-01
    “…It is assumed that the objective of optimal cash holding is to minimize the probability of bankruptcy and the security area of cash holding is the constraint condition. …”
    Get full text
    Article
  7. 5927

    A long-time & short-time prediction based 5G base station energy-saving policy by Miaomiao ZHANG, Hao ZHAO, Yan ZHOU, Yang ZHANG, Li YU, Yanping LIANG, Chunjie FENG

    Published 2022-11-01
    “…With the development of the mobile communication technology and the acceleration of 5G commercial network deployment, energy consumption of 5G, which will continue to raise the operating expense significantly.How to maximize the energy efficiency while ensuring service experience and equipment safety has always been one of the research focus in the industry.With the challenges including complexity of network architecture and variety of base station types, an AI-based energy-saving technology including policy generation and closed-loop security assurance of “perception, prediction, analysis, and decision” was introduced.After calibration and validation based on the offline dataset, the false-switch-off rate is less than 2%, and the recall rate is not fewer than 84%.Further study shows that the technology has greater potential on energy-saving.…”
    Get full text
    Article
  8. 5928

    Research on space focusing virtual coverage based on orthogonal frequency time reversal method by Yifang NIE, Fangwei LI

    Published 2019-10-01
    “…To solve the problem of information leakage and coverage efficiency in ultra-dense wireless network,the orthogonal frequency-time reversal virtual coverage scheme was proposed.At first,different wireless reversal channels with lower correlation were distinguished by orthogonal carries.Next,after time reversal,the space focusing of each target signal was realized around the terminal.Then,theoretical expressions of the signal coverage and the signal-interference-to-noise ratio were derived and proved.Ultimately,the virtual coverage was shaped,meeting the requirements of users.The coverage of unrelated user not belonging to system was reduced.The results show that those unrelated users are difficult to receive the target signal because of virtual coverage.In addition,the system has higher capacity and security rate of reliable transmission without any more power or antennas.…”
    Get full text
    Article
  9. 5929

    Fair secret sharing scheme using asymmetric bivariate polynomial by Wenwei YANG, Yuqing XING

    Published 2019-02-01
    “…In Shamir's (t,n) secret sharing scheme,any m (m≥t) participants can reconstruct the secret,and any less than t participants can't get any information about the secret.However,if there are more than t participants in the secret reconstruction phase,Shamir's secret reconstruction phase can not prevent external attackers from knowing the secret,while internal attackers can release a fake share to deceive honest participants during the secret reconstruction process.A rational threshold secret sharing scheme using asymmetric bivariate polynomial with unknown rounds is proposed.Then it shows its fairness and security against non-cooperative attack with synchronization,non-cooperative attack with a synchronization,cooperative attack with synchronization and cooperative attack with a synchronization.…”
    Get full text
    Article
  10. 5930

    Development of an Intelligent Communication Platform for Remote Practical Work in Education: Integrating AR, VR, and Cloud Technologies by El Gourari Abdelali, Ezzini Mustapha, Raoufi Mustapha, Skouri Mohammed, Achki Samira, Ait Lahcen Yassine, Mouachi Raja

    Published 2024-01-01
    “…The platform integrates with existing learning management systems (LMS) to provide a flexible and secure learning environment. A systematic development process, guided by user feedback, ensures continuous improvement and alignment with educational goals.…”
    Get full text
    Article
  11. 5931

    « Qu’avez-vous fait de vos vingt ans ? » Militantismes marocains du 23-mars (1965) au 20 février (2011) by Frédéric Vairel

    Published 2012-10-01
    “…The institutionalization of the Moroccan protest space from which the February 20 movement emerged, and the effects of learning for protesters and security forces alike were the reason for extremely cautions behaviors in an effort to avoid escalation. …”
    Get full text
    Article
  12. 5932

    Homomorphic Signature With Designated Evaluator by Kazuma Shiraishi, Keisuke Hara, Toi Tomita, Kyosuke Yamashita, Junji Shikata

    Published 2025-01-01
    “…Additionally, we achieve a post-quantum variant of this homomorphic signature scheme with a designated evaluator, provided that the underlying building blocks are post-quantum secure. This represents the first post-quantum realization of such a scheme.…”
    Get full text
    Article
  13. 5933

    Digital media representation under complex number base and its application on information hiding by Wei CHEN, Ya-nan CHEN, IUYuan L

    Published 2016-12-01
    “…With the rapid development and wide application of the digital media technology,the information security problem is becoming more and more highly attention.Because of the various kinds of medias,previous research works have focused on a specific digital media from,such as text,image,audio and video.As a fact that all the objects were expressed in digital forms under the environment of computer and network,a unified form for all kinds of digital media under the complex number base system was proposed.The algorithm of the digital media signal and the complex number intercom version were given,so the relationship among the digital media could be converted to the corresponding geometric relationship on the complex plane.In the experiments,the proposed method was applied to the application of the digital media information hiding.…”
    Get full text
    Article
  14. 5934

    ACCOUNTING TREATMENT AND LEGISLATION OF LEASING ARRANGEMENTS by Selma Novalija, Hamid Mutapčić, Elmira Kovač

    Published 2011-11-01
    “… Companies are not always able to purchase fixed assets required to start, expand or modernize their own operations, and also do not have adequate resources that could offer as security for bank loans. Leasing is the answer to such problems, as it provides the possibility of leasing recipient to obtain the necessary equipment. …”
    Get full text
    Article
  15. 5935

    Efficient three-party authenticated key agreement protocol based on chaotic map by Xiong LI, Fan WU, Jun-guo LIAO, Yu-zhen LIU

    Published 2016-06-01
    “…Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.…”
    Get full text
    Article
  16. 5936

    Survey on SDN-based network testbeds by Tao HUANG, Jiang LIU, Chen ZHANG, Liang WEI, Yunjie LIU

    Published 2018-06-01
    “…The network testbed based on software defined networking (referred as SDN testbed) has attracted extensive attention in the academic and industrial circles in recent years,and there have been many valuable cases of system/platform construction.Therefore,an overview of the SDN testbed was intended to conduct in the global scope.Firstly,the advantages of the SDN testbed and the basic design principles of the large-scale SDN testbed was explored comparing with the traditional network testbed.Secondly,in-depth analysis of existing SDN testbed projects was provided from the aspects of the project objectives and progress,the key technologies,network deployment,and featured applications.Finally,the challenges faced in this field were described in terms of network slicing,light and wireless convergence,security,and reliability.Future research directions are also suggested.…”
    Get full text
    Article
  17. 5937

    Design and implementation of high-speed network traffic sensor for emergency response by Ya-zhou MA, Jian GONG, Wang YANG

    Published 2014-10-01
    “…In the network analysis and tracking,network security emergency response needs a emsrgency sensor that captures saw packets of specific IP,port,protocol.Base on the high-speed packet capture tool PF_RING DNA,it uses mutil-thread to capture network packets that match sensor rules,and allocates the shared buffer to improve the performance of the disk storage of packets,at the same time through setting different states for the packet sensor rule,impliments adding sensor rules and human intervention dynamically.The experimental results show that in the dual 10 Gigabit NICs environment,emergency sensor can capture and handle network traffic of 19.98 Gbit/s(3.5 Mpacket/s),and the maximum rate of emergency sensor is 1 297 Mbit/s(204.9 kpacket/s).…”
    Get full text
    Article
  18. 5938

    Analysis of the state of the gas market in the context of the aggravation of the Ukrainian crisis by E. A. Rechkina, A. M. Terekhov

    Published 2023-05-01
    “…The main requirement for the model is its stability to the dynamics of macroeconomic indicators, exchange rates, as well as financial instruments that affect energy and environmental security in the world. Special attention is paid to the study of approaches to assessing the indicators of the gas market.…”
    Get full text
    Article
  19. 5939

    Mathematical Modelling and Optimal Control Strategies of a Multistrain COVID-19 Spread by Bouchaib Khajji, Lahoucine Boujallal, Omar Balatif, Mostafa Rachik

    Published 2022-01-01
    “…Secondly, three controls are considered in our model to minimize the multistrain spread of the disease, namely, vaccination, security campaigns, social distancing measures, and diagnosis. …”
    Get full text
    Article
  20. 5940

    Identity-based cloud storage integrity checking from lattices by Miaomiao TIAN, Chuang GAO, Jie CHEN

    Published 2019-04-01
    “…With the rapid development of cloud storage,more and more users are storing their data in the cloud.To verify whether the users’ data stored in the cloud is corrupted,one effective method is to adopt cloud storage integrity checking schemes.An identity-based cloud storage integrity checking scheme was proposed on the small integer solution problem over ideal lattices,and it was proven to be secure against the adaptive identity attacks of clouds in the random oracle model.To validate the efficiency of the scheme,extensive experiments were conducted to make performance-comparisons between the scheme and the existing two identity-based cloud storage integrity checking schemes.The experimental results show that the online tag-generation time and the proof-verification time of the scheme are respectively reduced by 88.32%~93.74% and 98.81%~99.73%.…”
    Get full text
    Article