Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6221
Hmotné (ne)zajištění evangelických kazatelů v první a druhé generaci
Published 2020-12-01“…The situation of the second-generation preachers is not known so well, however, usually a stable and secure position is attributed to them. Looking closer at both the generations, it is evident that in neither of them the financial state of preachers was definite and their material provision did not depend so much on the amount of service but on the broader economic and social aspects. …”
Get full text
Article -
6222
SDN based e-mail repudiation source restraining method
Published 2016-09-01“…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
Get full text
Article -
6223
Dams, development and disposability: Eco-anxiety, precarity and submerging voices in Na. D’souza’s Dweepa
Published 2025-01-01“…The absence of ethical considerations such as empathy, inclusion, and egalitarian ideology in the development narrative often leads to the devaluation of certain lives while prioritising the safety and security of others. Within this particular setting, it is important to recognise the trajectories of those whose lives are considered disposable. …”
Get full text
Article -
6224
Making AI an ally for sustainable agriculture in the face of climate change
Published 2025-01-01“…These disruptions threaten food production, global food security, economic stability and community livelihoods. …”
Get full text
Article -
6225
EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid
Published 2015-05-01“…In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. …”
Get full text
Article -
6226
Multi-authority ABS supporting dendritic access structure
Published 2017-07-01“…Attribute-based signature (ABS),which could realize fine-grained access control,was considered to be an important method for anonymous authentication in cloud computing.However,normal ABS only provided simple access control through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud.Moreover,the attribute sets were supervised by only one attribute authority,which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached.Aiming at tackling the problems above,a novel scheme,was proposed called multi-authority ABS supporting dendritic access structure which supported any AND,OR and threshold gates and affords more flexible access control.Meanwhile,the attribute sets of users were classified by diverse attribute authorities which reduced the overhead and the risk of systems.Besides,the scheme is proved to be selective predicate chosen message attack secure in the random oracle model.…”
Get full text
Article -
6227
IEEE 802.1x-based user identity-embedded IPv6 address generation scheme
Published 2019-12-01“…Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.…”
Get full text
Article -
6228
SD-WAN tunnel technology and network constuction
Published 2021-01-01“…The status of SD-WAN technology was introduced, the SD-WAN advantages with traditional line were compared.The basic technical features of SD-WAN, the software definition network controllers of SD-WAN, security encryption and tenant isolation, the SD-WAN industry standards were described.The relevant technologies of SD-WAN main manufacturers were also analyzed, the tunnel technology used by SD-WAN was compared.And private IPSec tunnel , VxLAN over IPSec, NvGRE over IPSec, SSL tunnel network project used by the different companys was compared and analyzed, the optimized tunnel technology project was given, and optimizational suggestions on how to use tunnel technology to complete networking project were further put forwarded, combined with the advantages of Internet service product in establishing SD-WAN, the POP network and peer-to-peer networking solutions were given.Finally, it make future development prospect for SD-WAN standards, Internet service product and SD-WAN manufacturers trends.…”
Get full text
Article -
6229
Cugoano on Redressing Slavery: The Demands of Liberty
Published 2025-01-01“…Cugoano envisioned legal redress to necessitate that all Afro-diasporic laborers be enfranchised, securing the conditions for a free community. By examining his vision for liberation, the article reconstructs Cugoano’s idea of liberty as a social and common good. …”
Get full text
Article -
6230
From Travel to Text: Reverends Wolff and Lansdell’s Missions to Bokhara
Published 2024-03-01“…My paper will examine the strategies Wolff and Lansdell employed in writing their journeys to Central Asian sensitive border regions under the imperial security constraints of the moment. Their failure of self-censorship in fact erupts in concealed messages to certain sections of Victorian readership able to read between the lines, revealing the undisclosed and unsaid.…”
Get full text
Article -
6231
Internet source address verification method based on synchronization and dynamic filtering in address domain
Published 2020-10-01“…At the beginning of the design of the Internet architecture,it assumed that all network members were trusted,and did not fully consider the security threat brought by the untrusted network members.For a long time,routers only forward packets based on the destination IP address of the packet,and do not carry out any verification on the source IP address of the packet.The lack of packet level authenticity on the Internet results in the header being maliciously altered.A real source address verification mechanism with routing synchronization and dynamic filtering were proposed.This mechanism constructs the filter table based on the prefix-topology mapping synchronization,the problem of inconsistent state between the filter table and the route caused by routing asymmetry were solved,false positives and false negatives was avoided,and a low-overhead and low-latency source address verification of the IP address prefix level granularity in the address domain were realized.…”
Get full text
Article -
6232
Optimum response scheme of intrusion detection based on information theory
Published 2020-07-01“…Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on information theory was proposed.Firstly,the intruder and IDS in the process of intrusion detection were abstracted into random variables,and the attack and defense model of intruder and IDS was constructed according to the results of the confrontation.Secondly,the defense channel of IDS was designed according to the attack and defense model,then the correct detection of IDS was transformed into the problem of successful transmission of 1 bit information in defensive channel.Finally,the defensive capability of the system was measured by analyzing the channel capacity of the defensive channel,the maximum mutual information of the defensive channel was the defensive limit capability of the IDS,and the corresponding strategy distribution was the optimal response strategy of the defensive capability of the system.The experimental results show that the scheme can effectively reduce the loss caused by FPs and FNs.…”
Get full text
Article -
6233
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
Get full text
Article -
6234
HDFS-oriented cryptographic key resource control mechanism
Published 2022-09-01“…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
Get full text
Article -
6235
Gendering analysis of working conditions and social protection law in digital labour platform work
Published 2024-12-01“…Through a gender-sensitive lens, we question the implications of social protection laws on issues such as income security, access to benefits, and workplace rights for women and gender minorities engaged in platform labour. …”
Get full text
Article -
6236
Block-based fair payment scheme under delegation computation
Published 2020-03-01“…In the traditional delegation computation,due to the self-interested behavior of both participants,there were some problems such as the denial of the principal and the dishonest calculation by the computing party.In the payment phase,a third party was required to ensure the fairness of the payment,which led to extra costs and risks of disclosure of participants' privacy.Game theory was used to analyze the Nash equilibrium solution between the two parties in the payment process,and a fair payment protocol based on time commitment of bitcoin was proposed.Firstly,the bitcoin time commitment technology was used to ensure the fairness of payment.Secondly,the decentralized feature of block chain was used to replace the third-party service to protect the privacy of all parties and realize the source of responsibility.Finally,the scheme was analyzed from the perspective of security and correctness,which proved that the participants choose behavioral strategies honestly in the payment process.The scheme proposed in this paper not only solved the problem of fair payment in traditional delegation computation,but also protected the privacy of participants.…”
Get full text
Article -
6237
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Published 2020-04-01“…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
Get full text
Article -
6238
Key technologies and application of artificial intelligence in telecom real-name system
Published 2019-05-01“…Besides, the means of real-name authentication business scenarios against attacks from the perspective of security were introduced and the effectiveness and efficiency of the proposed solution were demonstrated. …”
Get full text
Article -
6239
A Discourse Coherence Analysis Method Combining Sentence Embedding and Dimension Grid
Published 2021-01-01Get full text
Article -
6240
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
Get full text
Article