Showing 6,221 - 6,240 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6221

    Hmotné (ne)zajištění evangelických kazatelů v první a druhé generaci by Gabriela Krejčová Zavadilová

    Published 2020-12-01
    “…The situation of the second-generation preachers is not known so well, however, usually a stable and secure position is attributed to them. Looking closer at both the generations, it is evident that in neither of them the financial state of preachers was definite and their material provision did not depend so much on the amount of service but on the broader economic and social aspects. …”
    Get full text
    Article
  2. 6222

    SDN based e-mail repudiation source restraining method by Zhi-geng HAN, Xia FENG, Geng CHEN

    Published 2016-09-01
    “…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
    Get full text
    Article
  3. 6223

    Dams, development and disposability: Eco-anxiety, precarity and submerging voices in Na. D’souza’s Dweepa by Goutam Karmakar

    Published 2025-01-01
    “…The absence of ethical considerations such as empathy, inclusion, and egalitarian ideology in the development narrative often leads to the devaluation of certain lives while prioritising the safety and security of others. Within this particular setting, it is important to recognise the trajectories of those whose lives are considered disposable. …”
    Get full text
    Article
  4. 6224

    Making AI an ally for sustainable agriculture in the face of climate change by Lalit Gautam

    Published 2025-01-01
    “…These disruptions threaten food production, global food security, economic stability and community livelihoods. …”
    Get full text
    Article
  5. 6225

    EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid by Jie Chen, Junping Shi, Yueyu Zhang

    Published 2015-05-01
    “…In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. …”
    Get full text
    Article
  6. 6226

    Multi-authority ABS supporting dendritic access structure by Ruo MO, Jian-feng MA, Xi-meng LIU, Qi LI

    Published 2017-07-01
    “…Attribute-based signature (ABS),which could realize fine-grained access control,was considered to be an important method for anonymous authentication in cloud computing.However,normal ABS only provided simple access control through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud.Moreover,the attribute sets were supervised by only one attribute authority,which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached.Aiming at tackling the problems above,a novel scheme,was proposed called multi-authority ABS supporting dendritic access structure which supported any AND,OR and threshold gates and affords more flexible access control.Meanwhile,the attribute sets of users were classified by diverse attribute authorities which reduced the overhead and the risk of systems.Besides,the scheme is proved to be selective predicate chosen message attack secure in the random oracle model.…”
    Get full text
    Article
  7. 6227

    IEEE 802.1x-based user identity-embedded IPv6 address generation scheme by Peng KUANG, Ying LIU, Lin HE, Gang REN

    Published 2019-12-01
    “…Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.…”
    Get full text
    Article
  8. 6228

    SD-WAN tunnel technology and network constuction by Jia NIU, Yongming YAN, Zhihua LIN

    Published 2021-01-01
    “…The status of SD-WAN technology was introduced, the SD-WAN advantages with traditional line were compared.The basic technical features of SD-WAN, the software definition network controllers of SD-WAN, security encryption and tenant isolation, the SD-WAN industry standards were described.The relevant technologies of SD-WAN main manufacturers were also analyzed, the tunnel technology used by SD-WAN was compared.And private IPSec tunnel , VxLAN over IPSec, NvGRE over IPSec, SSL tunnel network project used by the different companys was compared and analyzed, the optimized tunnel technology project was given, and optimizational suggestions on how to use tunnel technology to complete networking project were further put forwarded, combined with the advantages of Internet service product in establishing SD-WAN, the POP network and peer-to-peer networking solutions were given.Finally, it make future development prospect for SD-WAN standards, Internet service product and SD-WAN manufacturers trends.…”
    Get full text
    Article
  9. 6229

    Cugoano on Redressing Slavery: The Demands of Liberty by Iziah C Topete

    Published 2025-01-01
    “…Cugoano envisioned legal redress to necessitate that all Afro-diasporic laborers be enfranchised, securing the conditions for a free community. By examining his vision for liberation, the article reconstructs Cugoano’s idea of liberty as a social and common good. …”
    Get full text
    Article
  10. 6230

    From Travel to Text: Reverends Wolff and Lansdell’s Missions to Bokhara by Irina Kantarbaeva-Bill

    Published 2024-03-01
    “…My paper will examine the strategies Wolff and Lansdell employed in writing their journeys to Central Asian sensitive border regions under the imperial security constraints of the moment. Their failure of self-censorship in fact erupts in concealed messages to certain sections of Victorian readership able to read between the lines, revealing the undisclosed and unsaid.…”
    Get full text
    Article
  11. 6231

    Internet source address verification method based on synchronization and dynamic filtering in address domain by Dan LI, Lancheng QIN, Jianping WU, Yingying SU, Mingwei XU, Xingang SHI, Yunan GU, Tao LIN

    Published 2020-10-01
    “…At the beginning of the design of the Internet architecture,it assumed that all network members were trusted,and did not fully consider the security threat brought by the untrusted network members.For a long time,routers only forward packets based on the destination IP address of the packet,and do not carry out any verification on the source IP address of the packet.The lack of packet level authenticity on the Internet results in the header being maliciously altered.A real source address verification mechanism with routing synchronization and dynamic filtering were proposed.This mechanism constructs the filter table based on the prefix-topology mapping synchronization,the problem of inconsistent state between the filter table and the route caused by routing asymmetry were solved,false positives and false negatives was avoided,and a low-overhead and low-latency source address verification of the IP address prefix level granularity in the address domain were realized.…”
    Get full text
    Article
  12. 6232

    Optimum response scheme of intrusion detection based on information theory by Youliang TIAN, Yulong WU, Qiuxian LI

    Published 2020-07-01
    “…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
    Get full text
    Article
  13. 6233

    Study on privacy preserving encrypted traffic detection by Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN

    Published 2021-08-01
    “…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
    Get full text
    Article
  14. 6234

    HDFS-oriented cryptographic key resource control mechanism by Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG

    Published 2022-09-01
    “…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
    Get full text
    Article
  15. 6235

    Gendering analysis of working conditions and social protection law in digital labour platform work by Kosjenka Dumančič, Alka Obadić

    Published 2024-12-01
    “…Through a gender-sensitive lens, we question the implications of social protection laws on issues such as income security, access to benefits, and workplace rights for women and gender minorities engaged in platform labour. …”
    Get full text
    Article
  16. 6236

    Block-based fair payment scheme under delegation computation by Ta LI, Youliang TIAN, Kang XIANG, Hongfeng GAO

    Published 2020-03-01
    “…In the traditional delegation computation,due to the self-interested behavior of both participants,there were some problems such as the denial of the principal and the dishonest calculation by the computing party.In the payment phase,a third party was required to ensure the fairness of the payment,which led to extra costs and risks of disclosure of participants' privacy.Game theory was used to analyze the Nash equilibrium solution between the two parties in the payment process,and a fair payment protocol based on time commitment of bitcoin was proposed.Firstly,the bitcoin time commitment technology was used to ensure the fairness of payment.Secondly,the decentralized feature of block chain was used to replace the third-party service to protect the privacy of all parties and realize the source of responsibility.Finally,the scheme was analyzed from the perspective of security and correctness,which proved that the participants choose behavioral strategies honestly in the payment process.The scheme proposed in this paper not only solved the problem of fair payment in traditional delegation computation,but also protected the privacy of participants.…”
    Get full text
    Article
  17. 6237

    Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG

    Published 2020-04-01
    “…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
    Get full text
    Article
  18. 6238

    Key technologies and application of artificial intelligence in telecom real-name system by Hui YAO, Siyan MA

    Published 2019-05-01
    “…Besides, the means of real-name authentication business scenarios against attacks from the perspective of security were introduced and the effectiveness and efficiency of the proposed solution were demonstrated. …”
    Get full text
    Article
  19. 6239
  20. 6240

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
    Get full text
    Article