Showing 721 - 740 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 721

    Survey on rail transit mobile edge computing network security by Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG

    Published 2023-04-01
    “…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
    Get full text
    Article
  2. 722

    Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency by Alessio Ferone, Stefano Verrilli

    Published 2025-01-01
    “…In particular, we demonstrate how blockchain can improve critical aspects of the security and transparency of digital twins by analyzing a real-world scenario and evaluating produced experimental data. …”
    Get full text
    Article
  3. 723

    Assessment of Economic Management of Land Resources to Enhance Food Security by Dinara Tleshpayeva, Natalia Bondarenko, Mikhail Leontev, Galina Mashentseva, Julia Plaksa, Andrey Zharov, Diana Stepanova, Agzhan Karbozova

    Published 2025-01-01
    “… To achieve the goals of balanced development of the agricultural sector to ensure food security, there is a need to improve management processes in the sphere of agricultural land use. …”
    Get full text
    Article
  4. 724

    The Role of Security Perception and Usage Impact of Mobile Accounting Applications by Isna Ardila, Masta Sembiring, Rini Astuti

    Published 2025-01-01
    Subjects: “…technology acceptance model; mobile accounting application; security perception.…”
    Get full text
    Article
  5. 725
  6. 726
  7. 727
  8. 728
  9. 729

    Optimal Management of Computer Network Security in the Era of Big Data by Minfeng Chen

    Published 2022-01-01
    “…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
    Get full text
    Article
  10. 730
  11. 731

    GUC-secure protocol for private relational join operator computing by Yuan TIAN, Rong-xin SUN, Wu-yang CAI

    Published 2014-11-01
    Subjects: “…secure multiparty computation…”
    Get full text
    Article
  12. 732
  13. 733

    LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation by Yashar Salami, Vahid Khajehvand

    Published 2021-01-01
    “…Yashar et al. recently proposed a secure key exchange scheme for the fog federation. …”
    Get full text
    Article
  14. 734
  15. 735

    SDN security prediction method based on bayesian attack graph by Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG

    Published 2021-11-01
    Subjects: “…SDN security prediction…”
    Get full text
    Article
  16. 736
  17. 737
  18. 738

    Security Mechanism for Dual Stack Network Accessing of Home Gateway by Zhonghua Chen

    Published 2014-12-01
    “…Secondly, three methods were given to solve the security problems. At last, a realization and experiment result was given.…”
    Get full text
    Article
  19. 739
  20. 740