Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7441
Special Economic Measures as a Form of Restriction of Freedom of Economic Activity in the Russian Federation
Published 2025-01-01“…The measures include general principles of restriction of rights: the principle of compliance of the restriction with constitutional purposes (ensuring the defense and security of the state, protection of life and health of citizens, etc.), the principle of reasonableness of the restriction (application of the restriction in order to organize the functioning of the economic system of the Russian Federation), the principles of legality, urgency, proportionality of the restrictions imposed on existing threats.At the same time, the author admits the necessity to improve the Russian legislation on special economic measures (including in terms of specifying the grounds, mechanisms and guarantees of their application to economic entities).…”
Get full text
Article -
7442
Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Published 2014-09-01“…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
Get full text
Article -
7443
Reflections about the sameness of human rights online and offline
Published 2024-01-01Get full text
Article -
7444
THE ROLE OF SECTOR IN USERS’ ATTITUDES TOWARDS THE PERCEIVED QUALITY OF SHARING ECONOMY SERVICES
Published 2023-07-01“…Additionally, both groups of users believe that they have multiple benefits from this service, such as the ability to meet other people and a sense of security. However, there is a statistically significant difference in user perception in certain aspects of the social category of service quality. …”
Get full text
Article -
7445
Administrative and legal means of ensuring the legality of entrepreneurial activity in Ukraine
Published 2018-12-01“…It has been established that the lawful nature of entrepreneurial activity ensures the protection of the life, health and property of each individual member of society, environmental protection and the environment, and the economic and national security of the state.…”
Get full text
Article -
7446
Novel distinguisher for SM4 cipher algorithm based on deep learning
Published 2023-07-01“…A method was proposed to construct a deep learning distinguisher model for large state block ciphers with large-block and long-key in view of the problem of high data complexity, time complexity and storage complexity of large state block cipher distinguishers, and the neural distinguishers were constructed for SM4 algorithm.Drawing inspiration from the idea that ciphertext difference could improve the performance of distinguishers, a new input data format for neural distinguisher was designed by using partial difference information between ciphertext pairs as part of the training data.The residual neural network model was used to construct the neural distinguisher.The training dataset for large blocks was preprocessed.Additionally, an improved strategy for model relearning was proposed to address the high specificity and low sensitivity of the constructed distinguisher.Experimental results show that the proposed deep learning model for SM4 can achieve 9 rounds neural distinguisher.The accuracy of 4~9 rounds distinguishers can reach up to 100%, 76.14%, 65.20%, 59.28%, 55.89% and 53.73% respectively.The complexity and accuracy of the constructed differential neural distinguisher are significantly better than those of traditional differential distinguishers, and it is currently the best neural distinguisher for the block cipher SM4 to our knowledge.It also proves that the deep learning method is effective and feasible in the security analysis of block cipher of large block.…”
Get full text
Article -
7447
Assessing Theoretical Frameworks, Human Resources Management Implications and Emerging Technologies on the Water, Energy and Food (WEF) Nexus
Published 2021-12-01“… The interactions of water, energy, and food resources resulting in WEF nexus thinking have been conceptualized as an integrated framework to achieve the security of the three vital resources. However, there are some gaps in WEF nexus research, which constrains the understanding and actualization of the nexus. …”
Get full text
Article -
7448
-
7449
-
7450
PREDICTABILITY AND ACCESSIBILITY OF THE LAW
Published 2023-06-01“…In order for the law to be accepted and respected, it must present a certain legal security, assuming the requirements of accessibility and predictability, logical coherence and stability, features designed to capture the trust of citizens in its provisions. …”
Get full text
Article -
7451
Responsibility for administrative delicts within banking operations
Published 2018-11-01“…The author of the article substantiates the theory of responsibility for administrative delicts within banking operations, namely: security, punitive, management, coercion, obligation, conviction. …”
Get full text
Article -
7452
Traceability permissioned chain consensus mechanism based on double-layer architecture
Published 2019-04-01“…The blocks in the blockchain are arranged in chronological and historical order,and the blockchain is incapable of modification through data encryption technology and consensus mechanism,which makes product trace ability to be an important application scenario of blockchain.To choose product information traceability technology,not only the feasibility of the technology but also the market attributes of the product and the producer should be considered,which makes the permissioned chain replace the public chain as an important deployment method of product information traceability.In the existing research results,the research on the traceability license chain mainly focuses on mechanism design and framework construction,and the consensus algorithm applicable to product information traceability is rarely studied.In the process of technology of engineering practice,practical byzantine fault tolerance was chosen more in league chain as the consensus of traceability chain mechanism (such as Hyperledger),but with the increasing number of participating nodes of the traceability chain efficiency will be significantly reduced,and the delay time will be significantly improved,resulting in most of the project is still in the stage of experiment.Based on this,a traceability license chain consensus mechanism based on double-layer architecture (DLPCM) is proposed,and its security is analyzed.Participants are divided into two layers on the vertical dimension,and different consensus mechanisms are adopted at different levels according to different deployment modes of blockchain.Finally,the traceability information query mechanism under the consensus mechanism is introduced,an important reference for the development and design of traceability system based on license chain is provided.…”
Get full text
Article -
7453
An Analysis of the Impact of the Oil Boom on Agriculture and Agricultural Research in Northern Nigeria, 1970-1987
Published 2023-07-01“… Since the 1970's, food security has eluded Nigeria despite its indisputable agricultural potential and abundant human resources. …”
Get full text
Article -
7454
“Yeni Terörizm”in Geleceğin Güvenlik Ortamına Etkileri: Daeş Örneği
Published 2019-12-01“…In this context, the effects of the “new terrorism” to future security environment was analyzed in this study through the DAESH terrorist organization, which is one of the best examples of the new terror definition.…”
Get full text
Article -
7455
Reversible data hiding scheme based on pixel-value differencing in dual images
Published 2020-07-01Get full text
Article -
7456
Determinants of M-Commerce Platform Adoption Among Individuals in South African Township Communities
Published 2025-01-01“…Social media and perceived security have a significant, positive effect on the trust of South African township residents to adopt m-commerce platforms. …”
Get full text
Article -
7457
Sentinels of environmental change: shifts in fish diversity through the lens of artisanal fishers
Published 2025-02-01“…Abstract River regulation has caused significant shifts in fish diversity, with severe impacts on small-scale artisanal fisheries, which depend on fishing resources for income, employment and food security. This study investigated how artisanal fishers perceive changes in fish diversity in response to river regulation, considering four facets: (i) fish abundance, (ii) species records, (iii) capture patterns, and (iv) most valued fish. …”
Get full text
Article -
7458
Enforced disappearances, multiple motherhoods: outlines for a communicational mapping of absences
Published 2021-01-01“…Personal conversations permeated the whole process and allowed to secure close communication with the participants. …”
Get full text
Article -
7459
E-Commerce Shop Helviah Skincare Mobile Application
Published 2024-12-01“…The application features an intuitive product catalog, a secure payment gateway, personalized recommendations, and real-time order tracking, ensuring a seamless shopping experience. …”
Get full text
Article -
7460
Informal Cross-Border Traders and Food Trade during the Global Pandemic in Zimbabwe
Published 2025-01-01“…More importantly, it demonstrates how the lack of understanding of the contribution of ICBTs to employment generation and urban food security has led to the adoption of policies and practices that do not accommodate informal food trading in the country’s urban landscape. …”
Get full text
Article