Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6141
Research on location privacy protection of mobile terminals for maritime monitoring sensor networks
Published 2021-12-01“…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
Get full text
Article -
6142
Historical and Legal Analysis of Economic Sanctions
Published 2024-07-01“…Subsequently, the evolution of the system of collective security fundamentally changed the role of economic sanctions. …”
Get full text
Article -
6143
Application of public key infrastructure in telecom operators
Published 2020-11-01“…With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.…”
Get full text
Article -
6144
Eaux, risques majeurs et patrimoine culturel : des directives européennes aux stratégies territoriales, état des lieux de la mise en œuvre en France
Published 2014-12-01“…They forced those involved in heritage management to consider the heritage resources associated with water ; to recognise them and to identify actions in order to heighten awareness and secure their protection. These heritage enquiries in regiontake different forms (inventories, university programs, inter-ministerial working groups ...) and they must be interlinked in order to show that natural and cultural heritage ressources inseparable.…”
Get full text
Article -
6145
Current and Emerging Protocols for Carbon Measurement in Agricultural Soils
Published 2023-10-01“…These massive C sinks have the potential to reverse soil degradation, mitigate climate change, and enhance food security. It is therefore essential to monitor the C cycle by accurately measuring the amount of soil C in agricultural fields. …”
Get full text
Article -
6146
A Transformer-Based Model for Abnormal Activity Recognition
Published 2024-04-01“…Given the increasing daily volume of videos generated by security cameras in personal and public spaces, monitoring the activities present in videos has become crucial. …”
Get full text
Article -
6147
Rehabilitation of Nonsyndromic Oligodontia in Deciduous Dentition Using Modified Hollywood Bridge - A Case Report
Published 2024-11-01“…In this appliance, molars are banded and acrylic teeth were secured to the stainless steel palatal wire with the help of heat cure acrylic resin. …”
Get full text
Article -
6148
Effects of (Ti, Mo)C precipitation on the microstructure, impact toughness, and sulfide stress corrosion cracking resistance of linepipe steels
Published 2025-01-01“…(Ti, Mo)C precipitation can help secure the strength, low-temperature toughness, and sulfide stress corrosion cracking (SSCC) resistance required for linepipes. …”
Get full text
Article -
6149
Design of privacy-preserving authentication protocol for service invocation
Published 2018-03-01“…Aiming at the requirement of the safe transmission of authentication credentials and the privacy preserving in service orientied multi-domain collaboration environment,a privacy-preserving authentication protocol for service invocation based on the provable secure certificateless aggregate signcryption scheme was proposed.By the path of the service invocation,the authentication information has been signcrypted successively,ensuring that the service providers can dynamically and orderly join in the process of service invocation authentication.The credentials and shared information can be safely transmitted respectively by the aggregate signcryption scheme and Diffie-Hellman algorithm,thus the SOAP message only can be decoded by specified acceptor,which is suitable for controlling the disclosure scope of the privacy information.Simultaneously,the public verifiability of CLASC can ensure that the validity of the aggregate signcryption can be verified by other service providers.The length of the SOAP message is shorter than existed protocols,which improve the transfer efficiency.…”
Get full text
Article -
6150
APPLICATION ON PREDICTING FATIGUE LIFE IN AIRCRAFT STRUCTURE BASED ON PHM TECHNOLOGY
Published 2017-01-01“…PHM( Prediction and Health Management) technology can be used to predict when fatigue failure may occur,thereby achieving self-service security and reducing the use and protection costs. …”
Get full text
Article -
6151
Diviser pour mieux juger : concurrence et convergence des parlements au xve siècle
Published 2022-01-01“…It intended to intensify judicial activity, to secure the loyalty of the cities and to govern closely the conquered territories. …”
Get full text
Article -
6152
Evaluating GPT models for clinical note de-identification
Published 2025-01-01“…Abstract The rapid digitalization of healthcare has created a pressing need for solutions that manage clinical data securely while ensuring patient privacy. This study evaluates the capabilities of GPT-3.5 and GPT-4 models in de-identifying clinical notes and generating synthetic data, using API access and zero-shot prompt engineering to optimize computational efficiency. …”
Get full text
Article -
6153
Bloom filter-based lightweight private matching scheme
Published 2015-12-01“…With rapid developments of mobile devices and online social networks,users of proximity-based mobile social networks (PMSN) could easily discover and make new social interactions with others,but they enjoyed this kind of conveniences at the cost of user privacy and system overhead,etc.To address this problem,a third party free and lightweight scheme to privately match the similarity with potential friends in vicinity was proposed.Unlike most existing work,proposed scheme considered both the number of common attributes and the corresponding priorities on each of them individually.The Bloom filter-based common-attributes estimation and the lightweight confusion binary vector scalar product protocol reduce the system overhead significantly,and can resist against brute force attack and unlimited input attack.The correctness,security and performance of overhead of proposed scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
Get full text
Article -
6154
Privacy-preserving convolutional neural network inference scheme based on homomorphic ciphertext transformation
Published 2024-10-01“…Theoretical analysis and experimental results show that the proposed scheme can ensure data security, and has higher inference accuracy and lower calculation and communication overhead.…”
Get full text
Article -
6155
Device-Free Localization Techniques: A Review
Published 2023-12-01“…By shedding light on these critical aspects, it offers valuable insights into the current state of DFL technology and its potential in diverse domains, ranging from smart environments to security systems. …”
Get full text
Article -
6156
One-way hash function construction based on Chen-type hyper-chaotic system and key-stream
Published 2009-01-01“…Theoretical analysis and experimental results indicate that the proposed algorithm can satisfy the required security performance, such as data compression function, irreversibility, initial value sensitivity forgery resistance and collision resistance. …”
Get full text
Article -
6157
La prensa anarquista española en Francia durante la reunificación de la CNT (1960-1965) y su repercusión en las relaciones bilaterales Francia-España
Published 2025-01-01“…Based on the critical study of the Spanish libertarian publications of the exile and the documentation from international archives, this article aims to show the evolution of the Spanish anarchist press in the French exile between 1960 and 1965, the prohibitions and obstacles to which had to face in terms of its dissemination, as well as the importance that factors related to the respective French and Spanish government interests in matters of security had in its existence, and its impact as a relevant issue in the evolution of bilateral diplomatic relations between both countries.…”
Get full text
Article -
6158
A Real-Time Optical Tracking and Measurement Processing System for Flying Targets
Published 2014-01-01“…The system can be used in the field of aerospace tests like target analysis including dynamic parameter, transient states, and optical physics characteristics, with security control.…”
Get full text
Article -
6159
Few-shot cybersecurity event detection method by data augmentation with prompting question answering
Published 2024-08-01“…The result showes that the proposed method’s substantial superiority in low-resource network security event detection tasks compared to other baseline methods.…”
Get full text
Article -
6160
Climate change, freshwater ecosystems and inland fisheries: implications for the developing nations
Published 2020-07-01“…Further, they are among the key components in achieving the United Nations Sustainable Development Goals (UN SDGs) set for the year 2030, including poverty reduction, food security, clean water and sanitation, conservation of biodiversity, and climate action. …”
Get full text
Article