Showing 5,941 - 5,960 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 5941

    Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO

    Published 2014-08-01
    “…Compared to other schemes, this scheme not only has much lower calculation and communication, but also convinces the verifier of the trustworthiness of the client's platform state during the platform identity attestation. A detailed security proof of the proposed scheme is presented by using the protocol composition logic, and the proof shows that the scheme satisfies correctness and anonymity of platform identity verification. …”
    Get full text
    Article
  2. 5942

    The algorithm of interaction of the enterprises of fuel and energy complex in implementation with the use of alternative means of payment by O V. Baikova, D. A. Kulakov

    Published 2019-04-01
    “…The possibilities of activation and development of resource trade as one of the main factors of increasing the security of the fuel and energy complex and the Russian economy as a whole have been discovered.…”
    Get full text
    Article
  3. 5943

    Cross-chain medical data sharing scheme based on elliptic curve signcryption by YU Huifang, LI Lei

    Published 2024-12-01
    “…To address the requester identity authentication and shared data security in cross-chain medical data sharing, a cross- chain medical data sharing scheme based on elliptic curve signcryption was devised in this article. …”
    Get full text
    Article
  4. 5944

    5-pass zero-knowledge identity authentication scheme based on matrix completion problem by Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG

    Published 2021-11-01
    “…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
    Get full text
    Article
  5. 5945

    Les institutions et les acteurs en santé au travail au Québec et en France : regard croisé by Nathalie Ferre

    Published 2010-02-01
    “…Work inspection comes into play to ensure compliance with standards. Social security organizations, which take charge of occupational injuries, encourage employers to do prevention. …”
    Get full text
    Article
  6. 5946

    Renewable energy in chemical industrial buildings for cost performance by Bernadette Detty Kussumardianadewi, Albert Eddy Husin, Lastarida Sinaga

    Published 2025-01-01
    “…Blockchain provides distributed, secure, permissioned transactional ledgers, that successfully deal with these problems. …”
    Get full text
    Article
  7. 5947

    Integral attack on MIBS block cipher by Zhi-shu PAN, Jian-sheng GUO, Jin-ke CAO, Wei LUO

    Published 2014-07-01
    “…The security of the block cipher MIBS against integral attack was analyzed and a 5-round distinguisher of MIBS was founded. …”
    Get full text
    Article
  8. 5948

    Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment by Sung-Wook Park, Im-Yeong Lee

    Published 2016-07-01
    “…In addition, related groups from the Republic of Korea have enhanced safety in communication by using standard techniques for activating NFC services. However, various security threats are still present in electronic payment methods that use NFC. …”
    Get full text
    Article
  9. 5949

    Comprehensive Review of Storage Optimization Techniques in Blockchain Systems by Yan Wang, Hao Wang, Yanghuang Cao

    Published 2024-12-01
    “…Blockchain technology, known for its decentralization, traceability, immutability, and security, has attracted widespread attention in academia and has been extensively applied in numerous fields. …”
    Get full text
    Article
  10. 5950

    RELIABILITY ANALYSIS FOR JACK-UP GEARBOX BASED ON COPULA BAYESIAN NETWORK by ZHANG Qing, LIU Chao, SUN YuanTao, QIN XianRong

    Published 2018-01-01
    “…The failure probability of gearbox was calculated by CBN,and the result showed that it was more secure and accurate than the traditional BN method.…”
    Get full text
    Article
  11. 5951

    Managing the industrial enterprises development in ecosystem interaction by O. E. Astafyeva

    Published 2022-01-01
    “…The benefits and limitations of sustainable development management, and the specific of data analysis in the digital ecosystem of the industrial enterprise as a component of sustainability and security of actors, have been defined. The components of a sustainable development framework have been identified and the effects obtained at the ecosystem level of interaction have been highlighted. …”
    Get full text
    Article
  12. 5952

    SCondi: A Smart Context Distribution Framework Based on a Messaging Service for the Internet of Things by Jongmoon Park, Myung-Joon Lee

    Published 2014-01-01
    “…The context channel provides a pluggable filter mechanism that supports effective extraction, tailoring, authentication, and security of information.…”
    Get full text
    Article
  13. 5953

    Watermarking algorithm for image authentication based on second generation Bandelet by LIU Xu-chong1, LUO Yong1, WANG Jian-xin1, WANG Jie1

    Published 2010-01-01
    “…A watermarking algorithm for image authentication was designed,which was based on second generation Bandelet translation and statistical model.The image directional flow was constructed by using Bandelet,and it could depict the characteristic of the image.By applying noise visibility function,the noise visibility intensity algorithm which was based on Gaussian statistical models was proposed.The blocks of image which contain more texture information were selected to hide the image directional flow,based on the noise visibility intensity algorithm.The image was authen-ticated through comparing the hiding information and the carrier image directional flow created by Bandelet.Experimen-tal results show that the algorithm can resist the JPEG compression and noise attack strongly and guarantee the quality of the sight.It is a blind detection algorithm,and this algorithm has high concealment performance and security.…”
    Get full text
    Article
  14. 5954

    Produire collectivement du sens en temps de crise : l'utilisation de Wikipédia lors de la pandémie de COVID-19 by Sandrine Bubendorff, Caroline Rizza

    Published 2021-09-01
    “…We also shed light on the specificities of the health crisis compared to others so-called civil security crises. Specifically, the construction of meaning related to the pandemic has been requiring an unprecedented reorganisation of their ways of editing and publishing these pages. …”
    Get full text
    Article
  15. 5955

    Detecting and preventing collusion attack in DPoS based on power index by Xiaodong FU, Xinxin QI, Li LIU, Wei PENG, Jiaman DING, Fei DAI

    Published 2022-12-01
    “…Since malicious nodes may manipulate voting elections through collusion attacks in consensus mechanism of DPoS, the security of block chain can not be guaranteed in the consensus process of DPoS.To deal with the problem, a method for detecting and preventing collusion attack in DPoS based on power index was proposed.Firstly, a weighted voting game model of DPoS was constructed based on the idea of power index in game theory, and the behavioral motivation of the malicious node could be analyzed.Then, the attacks were detected based on changing range of abnormal power index.During the process of preventing collusion attacks in DPoS, the Softsign activation function was adapted to suppress the power index of malicious nodes.Lastly, the effectiveness of the proposed method to detect and prevent collusion attacks in DPoS was verified through theoretical analysis and experiments.…”
    Get full text
    Article
  16. 5956

    Research on sybil attack in defense blockchain based on improved PBFT algorithm by Yingxu LAI, Zunxu BO, Jing LIU

    Published 2020-09-01
    “…Aiming at the problem that sybil attack has great harm to block chain technology,a method to improve the PBFT algorithm in the alliance chain to defend against sybil attacks was proposed.Firstly,using the idea of consensus algorithm based on proof of rights and interests,a reputation model was established,the reputation value of each node accorded to the behavior of each node in the consensus process was calculated,and different discourse rights accorded to the size of the reputation value was given.Then pre-commit phase was added to the PBFT algorithm to reduce the number of communication between nodes.The solution through formal analysis and reasoning and security testing shows that the improved PBFT algorithm can not only effectively defend against sybil attacks in the blockchain,but also make the performance of the blockchain system in terms of TPS and block generation delay.…”
    Get full text
    Article
  17. 5957

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    “…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
    Get full text
    Article
  18. 5958

    Ville durable et nouveaux territoires du corps by Guy Di Méo, Karen Foussette

    Published 2018-04-01
    “…More than the controversial building of eco-neighbourhoods, more than discourses on local democracy (that has aborted) or sustainable development (that is very blurred), this new spatial corporeity and its exigencies in terms of urban transparency (that is to say in terms of environmental and socio-spatial justice desire, of security and civility, of nature) polarize the political stakes of the sustainable city.…”
    Get full text
    Article
  19. 5959

    Economic Instruments for Reducing CO2 Emmissions and their Consequences by Renata Slabe Erker, Klemen Koman, Boris Majcen

    Published 2009-03-01
    “…The most favorable scenario in macroeconomic terms is the scenario of emissions trading in energy intensive sectors with a gradual transition to auctioning and carbon taxation in other sectors, whereby the tax revenues are returned to reduce the rate of social security contributions.…”
    Get full text
    Article
  20. 5960

    Efficient fuzzy attribute-based signcryption scheme by Xiao-yuan YANG, Zhi-qiang LIN, Yi-liang HAN

    Published 2013-08-01
    “…Multi-user communication is the major model of present information exchange and to improve communication security and to solve the problem of communication efficiency is the key of present research. …”
    Get full text
    Article