Showing 621 - 640 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 621
  2. 622
  3. 623
  4. 624
  5. 625
  6. 626
  7. 627

    Security mechanism in access control based on non-cooperative game by Yi-xuan ZHANG, Jing-sha HE, Bin ZHAO

    Published 2014-11-01
    “…Access control technology is an important information security technology to protect the sensitive information and critical resources in computer system and network.But traditional access control methods could only respond to access requests of users passively and can’t meet the changing dynamic network environment.In order to improve the ability to respond to malicious attacks and threats in access control system,a security mechanism is designed,which is suitable for access control,based on non-cooperative game theory in the game.When the subject makes an access request to the object,there will be a non-cooperative game between them to get Nash equilibrium.Then the security mechanism will compare the probabilities in the Nash equilibrium to the setting thresholds to get the conclusion that whether to authorize the subject or not.Experiment proves the effectiveness of the security mechanisms.…”
    Get full text
    Article
  8. 628
  9. 629
  10. 630
  11. 631

    Cooperative secure transmission against collusive eavesdroppers in Internet of Things by Xin Fan, Yan Huo

    Published 2020-06-01
    “…As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. …”
    Get full text
    Article
  12. 632

    Creating and Implementing an Effective and Deterrent National Cyber Security Strategy by Mustafa Senol, Ertugrul Karacuha

    Published 2020-01-01
    “…This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. …”
    Get full text
    Article
  13. 633

    Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks by Jun-Sub Kim, Jin Kwak

    Published 2013-01-01
    “…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
    Get full text
    Article
  14. 634

    The Role of Basic Infrastructure to Strengthen Economic Security in Eastern Indonesia by Firre An Suprapto, Agus Manshur, Sumedi Andono Mulyo, Editha Praditya, Fiktia Alfianita

    Published 2024-08-01
    “…Increasing agricultural productivity has positive implications for Indonesia's food and economic security. Investment in water infrastructure development is needed to support leading sectors.…”
    Get full text
    Article
  15. 635
  16. 636
  17. 637

    Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services by Youngsook Lee, Juryon Paik

    Published 2014-01-01
    “…We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.…”
    Get full text
    Article
  18. 638
  19. 639
  20. 640