Showing 681 - 700 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 681

    A survey of attack and defense on human-computer interaction security by Kaiqiang GE, Tieming CHEN

    Published 2019-10-01
    “…With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer interaction security attacks frequently occur.The status of four kinds of human-computer interaction technologies:HID-USB,fingerprint recognition,speech recognition and face recognition,as well as the offensive and defensive benefits were reviewed and analyzed,and the research direction of human-computer interaction security in the future was discussed.At the same time,some suggestions were given.…”
    Get full text
    Article
  2. 682
  3. 683

    A New Data Coding Algorithm for Secure Communication of Image by Hidayet Oğraş

    Published 2024-11-01
    “…This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. …”
    Get full text
    Article
  4. 684

    Formal Security in the Works of Legal Scholars of Pre-Soviet Period by E. E. Silantyeva

    Published 2021-07-01
    Subjects: “…formal security…”
    Get full text
    Article
  5. 685
  6. 686

    Management technologies of cyberspace endogenous safety and security test site by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2021-03-01
    Subjects: “…endogenous safety and security…”
    Get full text
    Article
  7. 687
  8. 688

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. …”
    Get full text
    Article
  9. 689

    Euro-Atlantic Security in U.S.-EURussia Triangle and Trump Factor by M. M. Panyuzheva

    Published 2019-12-01
    Subjects: “…euro-atlantic security system…”
    Get full text
    Article
  10. 690
  11. 691
  12. 692

    EDSM:secure and efficient scalar multiplication algorithm on Edwards curves by ZHANG Bao-hua1, YIN Xin-chun2, ZHANG Hai-ling2

    Published 2008-01-01
    “…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
    Get full text
    Article
  13. 693
  14. 694
  15. 695

    A Secure and Efficient White-Box Implementation of SM4 by Xiaobo Hu, Yanyan Yu, Yinzi Tu, Jing Wang, Shi Chen, Yuqi Bao, Tengyuan Zhang, Yaowen Xing, Shihui Zheng

    Published 2024-12-01
    “…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
    Get full text
    Article
  16. 696

    The War in Ukraine, Agricultural Trade and Risks to Global Food Security by Thomas Glauben, Miranda Svanidze, Linde Götz, Sören Prehn, Tinoush Jamali Jaghdani, Ivan Đurić, Lena Kuhn

    Published 2022-06-01
    “…Abstract Any calls to move towards a centrally planned economy or autarky are strongly advised against, as this would only be to the detriment of food security in the Global South.…”
    Get full text
    Article
  17. 697

    Changing role of security alliances in the post-Cold War era by I. A. Istomin, A. V. Levchenko

    Published 2024-07-01
    “…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
    Get full text
    Article
  18. 698
  19. 699

    Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications by Y. P. Makimaa, R. Sudarmani

    Published 2024-01-01
    “…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
    Get full text
    Article
  20. 700

    Study of BGP secure scheme based on divide and conquer strategy by Bin WANG, Jin-liang AN, Chun-ming WU, Ju-long LAN

    Published 2012-05-01
    Subjects: “…border gateway protocol security…”
    Get full text
    Article