Showing 6,261 - 6,280 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 6261

    Practical group signature scheme with verifier-local revocation by LI Ji-guo, SUN Gang, ZHANG Yi-chen

    Published 2011-01-01
    “…An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with verifier-local revocation;for example,some group signature schemes do not have exculpability and the computation cost of revocation check is dependent on the length of the revocation list,and so on.In order to solve above problems,and aim at the application of group signatures for enabling privacy-preserving attestation,a practical group signature scheme with verifier-local revocation based on the strong Diffie-Hellman assumption and decision linear Diffie-Hellman assumption,which was proven to be secure in the random Oracle model was proposed.The efficiency of the proposed scheme was analyzed.Compared with the existing verifier-local revocation group signatures,the computa-tion cost of revocation check in the scheme is independent of the length of the revocation list.At the same time,the scheme satisfies exculpability and backward unlinkability.…”
    Get full text
    Article
  2. 6262

    An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks by Wei Yuan

    Published 2014-01-01
    “…Different from previous anonymous secure routing protocols, this paper proposes an anonymous routing protocol, ARAKE, which not only makes the sender and the receiver anonymous but also hides the intermediate nodes from the network simultaneously. …”
    Get full text
    Article
  3. 6263
  4. 6264

    Method to improve edge coverage in fuzzing by Chunfu JIA, Shengbo YAN, Zhi WANG, Chenlu WU, Hang LI

    Published 2019-11-01
    “…Aiming at the problems of incomplete edge coverage,insufficient uses of edge coverage information and valid bytes information in AFL (American fuzz lop),a novel method was proposed.Firstly,a new seed selection algorithm was introduced,which could completely cover all edges discovered in one cycle.Secondly,the paths were scored according to the frequency of edges,to adjust the number of tests for each seed.Finally,more mutations were crafted on the valid bytes of AFL.Based on the method above,a new fuzzing tool named efuzz was implemented.Experiment results demonstrate that efuzz outperforms AFL and AFLFast in the edge coverage,with the increases of 5% and 9% respectively.In the LAVA-M dataset,efuzz found more vulnerabilities than AFL.Moreever,in real world applications efuzz has found three new security bugs with CVEs assigned.The method can effectively improve the edge coverage and vulnerability detection ability of fuzzer.…”
    Get full text
    Article
  5. 6265

    Le timide reboisement des paysans ghanéens by Stefano Boni

    Published 2007-11-01
    “…Even though efforts towards reforestation meet local demands, are economically viable and ecologically sound, these are hampered by a land tenure system that still offers no timber tenurial security to farmers. Recent legislative reforms concerning land tenure have not reassured farmers of their timber tenure prerogatives. …”
    Get full text
    Article
  6. 6266

    Three-Dimensional Human Modeling Applications in Sport Sciences by Mehmet İmamoğlu, Osman İmamoğlu

    Published 2018-08-01
    “…Virtual objects, which are transferred to virtual environments by a designer or a design team using various software, has been used many important areas such as health, security, education and sports which are using computer technology. …”
    Get full text
    Article
  7. 6267

    Agricultura Urbana e a transformação da vida e da paisagem no Tatuquara, Curitiba-PR by Valéria Borges Yonegura, Henrique Manoel da Silva

    Published 2021-11-01
    “…It was observed that UA was responsible for increasing the improvement of life, landscape and security in the local community, as well as the sense of topophilia, the emotional bond between people and place, according to Yi-Fu Tuan. …”
    Get full text
    Article
  8. 6268

    Contesting crisis narratives amidst climatic breakdown: Climate change, mobility, and state-centric approaches to migration by Kenna Sim-Sarka

    Published 2025-01-01
    “…It is often assumed by international institutions and national governments that climate change will drive mass migration movements across borders, leading to a prioritization of research that aims to predict future climate migration to aid border security and the creation of migration policies. This article focuses on knowledge production research concerning around climate-related mobility and how knowledge being produced upholds state-centric approaches to migration and migration management. …”
    Get full text
    Article
  9. 6269
  10. 6270

    Abnormal trajectory detection method based on enhanced density clustering and abnormal information mining by Ming HE, Gong-da QIU, Bo ZHOU, Qiang LIU, Yu-ting CAO

    Published 2017-12-01
    “…Aiming at problems of low accuracy in the recognition and difficulty in enriching the information of abnormal behavior in the social security incidents,an abnormal trajectory detection method based on enhanced density clustering and abnormal information mining was proposed.Firstly,combined with Hausdorff distance,an enhanced DTW distance aiming at the problem of sampling to describe the behavior in detail was proposed.And based on the MBR distance, some definitions to describe the geographical distribution of trajectory were proposed.Secondly,with the density-distance decision model of CFSFDP algorithm,intelligent recognition of cluster was realized by using the difference of SSVR which was proposed based on SVR.Finally,based on the analysis of distribution under the two kinds of density,more abnormal information could be mined,three kinds of abnormal trajectories would be recognized.And the simulation results on trajectory data of Shanghai and Beijing verify that the algorithm is objective and efficient.Comparing to existing method,accuracy in the clustering is promoted by 10%,and the abnormal trajectories are sorted, abnormal information is enriched.…”
    Get full text
    Article
  11. 6271

    Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos by Jian Wang

    Published 2016-01-01
    “…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
    Get full text
    Article
  12. 6272
  13. 6273

    Cloud data assured deletion scheme based on overwrite verification by Ruizhong DU, Pengliang SHI, Xinfeng HE

    Published 2019-01-01
    “…At the end of data life cycle,there is still a risk of data leakage,because mostly data which was stored in cloud is removed by logical deletion of the key.Therefore,a cloud data assured deletion scheme (WV-CP-ABE) based on ciphertext re-encrypt and overwrite verification was proposed.When data owner wants to delete the outsourced data,the data fine-grained deletion operation was realized by re-encrypting the ciphertext to change the access control policy.Secondly,a searchable path hash binary tree (DSMHT) based on dirty data block overwrite was built to verify the correctness of the data to be deletion.Finally,the dual mechanism of changing the ciphertext access control policy and data overwriting guarantees the data assured deletion.The experimental analysis proves that the fine-grained control is better and the security is more reliable than the previous logical delete method in the assured deletion of data.…”
    Get full text
    Article
  14. 6274

    Omilayers: a Python package for efficient data management to support multi-omic analysis by Dimitrios Kioroglou

    Published 2025-02-01
    “…Conducting an effective analysis of these datasets necessitates a data management system that meets a specific set of requirements, such as rapid storage and retrieval of data with varying numbers of features and mixed data-types, ensurance of reliable and secure database transactions, extension of stored data row and column-wise and facilitation of data distribution. …”
    Get full text
    Article
  15. 6275

    Discussions about application of blockchain in IoT systems by Zhen GAO, Qimei CUI, Xuefei ZHANG, Xiaofei WANG

    Published 2020-06-01
    “…Blockchain technology has attracted wide attention in recent years,and many industries are trying to solve the reliability and security problems of traditional centralized schemes in information systems based on blockchain technology.However,the connection between the blockchain network and industry entities must rely on the Internet of things (IoT) technology.Therefore,combining the blockchain and IoT technology to solve the pain points of vertical industries is the current research hotspot.On the other hand,the development of IoT itself is also limited by the centralized architecture,and how to use the blockchain technology to solve the predicament of IoT is also an important issue.Although there are many blockchain related applications,some of them are actually not suitable for blockchain technology.Firstly,the proper logic of blockchain applications was discussed.Then suitable application scenarios of blockchain technology were introduced by typical case analysis.Finally,four common problems when combining blockchain and IoT were discussed.…”
    Get full text
    Article
  16. 6276

    ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS by Małgorzata Garstka

    Published 2022-06-01
    “…The accessibility of information is connected with the level of security of engaging in business activities. Making changes in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be one solution for the problem of insufficient information. …”
    Get full text
    Article
  17. 6277

    Privacy-preserving attribute-based encryption scheme on ideal lattices by Xixi YAN, Yuan LIU, Zichen LI, Yongli TANG, Qing YE

    Published 2018-03-01
    “…Based on the small key size and high encryption efficiency on ideal lattices,a privacy-preserving attribute-based encryption scheme on ideal lattices was proposed,which could support flexible access policies and privacy protection for the users.In the scheme,a semi-hidden policy was introduced to protect the users’ privacy.Thus,the sensitive values of user’s attributes are hidden to prevent from revealing to any third parties.In addition,the extended Shamir secret-sharing schemes was used to construct the access tree structure which can support “and” “or” and “threshold” operations of attributes with a high flexibility.Besides,the scheme was proved to be secure against chosen plaintext attack under the standard mode.Compared to the existing related schemes,the scheme can yield significant performance benefits,especially the size of system public/secret keys,users’ secret key and ciphertext.It is more effective in the large scale distributed environment.…”
    Get full text
    Article
  18. 6278

    Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG

    Published 2016-08-01
    “…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
    Get full text
    Article
  19. 6279

    Conveniencialização da comida e do comer by Maycon Noremberg Schubert

    Published 2023-06-01
    “…It concludes that there is a need to (re)think food policies on aspects related to labor relations, Food and Nutritional Security, regulation of business mergers/acquisitions, food waste, climate change and the oversight of the spaces in which the Dark Kitchens operate. …”
    Get full text
    Article
  20. 6280

    15. listopad 1939: Zprávy německé provenience by Michal V. Šimůnek

    Published 2025-01-01
    “…Among others, the report from the head of the Reich Main Security Office (Reichssicherheitshauptamt) R. Heydrich to the head of the Reich Chancellery (Reichskanzlei) H. …”
    Get full text
    Article