Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6261
Practical group signature scheme with verifier-local revocation
Published 2011-01-01“…An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with verifier-local revocation;for example,some group signature schemes do not have exculpability and the computation cost of revocation check is dependent on the length of the revocation list,and so on.In order to solve above problems,and aim at the application of group signatures for enabling privacy-preserving attestation,a practical group signature scheme with verifier-local revocation based on the strong Diffie-Hellman assumption and decision linear Diffie-Hellman assumption,which was proven to be secure in the random Oracle model was proposed.The efficiency of the proposed scheme was analyzed.Compared with the existing verifier-local revocation group signatures,the computa-tion cost of revocation check in the scheme is independent of the length of the revocation list.At the same time,the scheme satisfies exculpability and backward unlinkability.…”
Get full text
Article -
6262
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…Different from previous anonymous secure routing protocols, this paper proposes an anonymous routing protocol, ARAKE, which not only makes the sender and the receiver anonymous but also hides the intermediate nodes from the network simultaneously. …”
Get full text
Article -
6263
Reducing Judicial Inconsistency through AI: A Review of Legal Judgement Prediction Models
Published 2025-01-01Get full text
Article -
6264
Method to improve edge coverage in fuzzing
Published 2019-11-01“…Aiming at the problems of incomplete edge coverage,insufficient uses of edge coverage information and valid bytes information in AFL (American fuzz lop),a novel method was proposed.Firstly,a new seed selection algorithm was introduced,which could completely cover all edges discovered in one cycle.Secondly,the paths were scored according to the frequency of edges,to adjust the number of tests for each seed.Finally,more mutations were crafted on the valid bytes of AFL.Based on the method above,a new fuzzing tool named efuzz was implemented.Experiment results demonstrate that efuzz outperforms AFL and AFLFast in the edge coverage,with the increases of 5% and 9% respectively.In the LAVA-M dataset,efuzz found more vulnerabilities than AFL.Moreever,in real world applications efuzz has found three new security bugs with CVEs assigned.The method can effectively improve the edge coverage and vulnerability detection ability of fuzzer.…”
Get full text
Article -
6265
Le timide reboisement des paysans ghanéens
Published 2007-11-01“…Even though efforts towards reforestation meet local demands, are economically viable and ecologically sound, these are hampered by a land tenure system that still offers no timber tenurial security to farmers. Recent legislative reforms concerning land tenure have not reassured farmers of their timber tenure prerogatives. …”
Get full text
Article -
6266
Three-Dimensional Human Modeling Applications in Sport Sciences
Published 2018-08-01“…Virtual objects, which are transferred to virtual environments by a designer or a design team using various software, has been used many important areas such as health, security, education and sports which are using computer technology. …”
Get full text
Article -
6267
Agricultura Urbana e a transformação da vida e da paisagem no Tatuquara, Curitiba-PR
Published 2021-11-01“…It was observed that UA was responsible for increasing the improvement of life, landscape and security in the local community, as well as the sense of topophilia, the emotional bond between people and place, according to Yi-Fu Tuan. …”
Get full text
Article -
6268
Contesting crisis narratives amidst climatic breakdown: Climate change, mobility, and state-centric approaches to migration
Published 2025-01-01“…It is often assumed by international institutions and national governments that climate change will drive mass migration movements across borders, leading to a prioritization of research that aims to predict future climate migration to aid border security and the creation of migration policies. This article focuses on knowledge production research concerning around climate-related mobility and how knowledge being produced upholds state-centric approaches to migration and migration management. …”
Get full text
Article -
6269
Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure
Published 2014-04-01Get full text
Article -
6270
Abnormal trajectory detection method based on enhanced density clustering and abnormal information mining
Published 2017-12-01“…Aiming at problems of low accuracy in the recognition and difficulty in enriching the information of abnormal behavior in the social security incidents,an abnormal trajectory detection method based on enhanced density clustering and abnormal information mining was proposed.Firstly,combined with Hausdorff distance,an enhanced DTW distance aiming at the problem of sampling to describe the behavior in detail was proposed.And based on the MBR distance, some definitions to describe the geographical distribution of trajectory were proposed.Secondly,with the density-distance decision model of CFSFDP algorithm,intelligent recognition of cluster was realized by using the difference of SSVR which was proposed based on SVR.Finally,based on the analysis of distribution under the two kinds of density,more abnormal information could be mined,three kinds of abnormal trajectories would be recognized.And the simulation results on trajectory data of Shanghai and Beijing verify that the algorithm is objective and efficient.Comparing to existing method,accuracy in the clustering is promoted by 10%,and the abnormal trajectories are sorted, abnormal information is enriched.…”
Get full text
Article -
6271
Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos
Published 2016-01-01“…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
Get full text
Article -
6272
Sarajevo in the Procrustean bed: "Siege" of a divided city
Published 2023-01-01Get full text
Article -
6273
Cloud data assured deletion scheme based on overwrite verification
Published 2019-01-01“…At the end of data life cycle,there is still a risk of data leakage,because mostly data which was stored in cloud is removed by logical deletion of the key.Therefore,a cloud data assured deletion scheme (WV-CP-ABE) based on ciphertext re-encrypt and overwrite verification was proposed.When data owner wants to delete the outsourced data,the data fine-grained deletion operation was realized by re-encrypting the ciphertext to change the access control policy.Secondly,a searchable path hash binary tree (DSMHT) based on dirty data block overwrite was built to verify the correctness of the data to be deletion.Finally,the dual mechanism of changing the ciphertext access control policy and data overwriting guarantees the data assured deletion.The experimental analysis proves that the fine-grained control is better and the security is more reliable than the previous logical delete method in the assured deletion of data.…”
Get full text
Article -
6274
Omilayers: a Python package for efficient data management to support multi-omic analysis
Published 2025-02-01“…Conducting an effective analysis of these datasets necessitates a data management system that meets a specific set of requirements, such as rapid storage and retrieval of data with varying numbers of features and mixed data-types, ensurance of reliable and secure database transactions, extension of stored data row and column-wise and facilitation of data distribution. …”
Get full text
Article -
6275
Discussions about application of blockchain in IoT systems
Published 2020-06-01“…Blockchain technology has attracted wide attention in recent years,and many industries are trying to solve the reliability and security problems of traditional centralized schemes in information systems based on blockchain technology.However,the connection between the blockchain network and industry entities must rely on the Internet of things (IoT) technology.Therefore,combining the blockchain and IoT technology to solve the pain points of vertical industries is the current research hotspot.On the other hand,the development of IoT itself is also limited by the centralized architecture,and how to use the blockchain technology to solve the predicament of IoT is also an important issue.Although there are many blockchain related applications,some of them are actually not suitable for blockchain technology.Firstly,the proper logic of blockchain applications was discussed.Then suitable application scenarios of blockchain technology were introduced by typical case analysis.Finally,four common problems when combining blockchain and IoT were discussed.…”
Get full text
Article -
6276
ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS
Published 2022-06-01“…The accessibility of information is connected with the level of security of engaging in business activities. Making changes in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be one solution for the problem of insufficient information. …”
Get full text
Article -
6277
Privacy-preserving attribute-based encryption scheme on ideal lattices
Published 2018-03-01“…Based on the small key size and high encryption efficiency on ideal lattices,a privacy-preserving attribute-based encryption scheme on ideal lattices was proposed,which could support flexible access policies and privacy protection for the users.In the scheme,a semi-hidden policy was introduced to protect the users’ privacy.Thus,the sensitive values of user’s attributes are hidden to prevent from revealing to any third parties.In addition,the extended Shamir secret-sharing schemes was used to construct the access tree structure which can support “and” “or” and “threshold” operations of attributes with a high flexibility.Besides,the scheme was proved to be secure against chosen plaintext attack under the standard mode.Compared to the existing related schemes,the scheme can yield significant performance benefits,especially the size of system public/secret keys,users’ secret key and ciphertext.It is more effective in the large scale distributed environment.…”
Get full text
Article -
6278
Privacy matching-based service proxy discovery scheme
Published 2016-08-01“…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
Get full text
Article -
6279
Conveniencialização da comida e do comer
Published 2023-06-01“…It concludes that there is a need to (re)think food policies on aspects related to labor relations, Food and Nutritional Security, regulation of business mergers/acquisitions, food waste, climate change and the oversight of the spaces in which the Dark Kitchens operate. …”
Get full text
Article -
6280
15. listopad 1939: Zprávy německé provenience
Published 2025-01-01“…Among others, the report from the head of the Reich Main Security Office (Reichssicherheitshauptamt) R. Heydrich to the head of the Reich Chancellery (Reichskanzlei) H. …”
Get full text
Article