Showing 7,441 - 7,460 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 7441

    Special Economic Measures as a Form of Restriction of Freedom of Economic Activity in the Russian Federation by M. A. Degtyarev

    Published 2025-01-01
    “…The measures include general principles of restriction of rights: the principle of compliance of the restriction with constitutional purposes (ensuring the defense and security of the state, protection of life and health of citizens, etc.), the principle of reasonableness of the restriction (application of the restriction in order to organize the functioning of the economic system of the Russian Federation), the principles of legality, urgency, proportionality of the restrictions imposed on existing threats.At the same time, the author admits the necessity to improve the Russian legislation on special economic measures (including in terms of specifying the grounds, mechanisms and guarantees of their application to economic entities).…”
    Get full text
    Article
  2. 7442

    Scheme on user identity attribute preserving based on ring signcryption for cloud computing by Shuan-bao LI, Jian-ming FU, Huan-guo ZHANG, Jing CHEN, Jing WANG, Bi-jun REN

    Published 2014-09-01
    “…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
    Get full text
    Article
  3. 7443
  4. 7444

    THE ROLE OF SECTOR IN USERS’ ATTITUDES TOWARDS THE PERCEIVED QUALITY OF SHARING ECONOMY SERVICES by Doris Podrug

    Published 2023-07-01
    “…Additionally, both groups of users believe that they have multiple benefits from this service, such as the ability to meet other people and a sense of security. However, there is a statistically significant difference in user perception in certain aspects of the social category of service quality. …”
    Get full text
    Article
  5. 7445

    Administrative and legal means of ensuring the legality of entrepreneurial activity in Ukraine by V. M. Vasyliev

    Published 2018-12-01
    “…It has been established that the lawful nature of entrepreneurial activity ensures the protection of the life, health and property of each individual member of society, environmental protection and the environment, and the economic and national security of the state.…”
    Get full text
    Article
  6. 7446

    Novel distinguisher for SM4 cipher algorithm based on deep learning by Huijiao WANG, Xin ZHANG, Yongzhuang WEI, Lingchen LI

    Published 2023-07-01
    “…A method was proposed to construct a deep learning distinguisher model for large state block ciphers with large-block and long-key in view of the problem of high data complexity, time complexity and storage complexity of large state block cipher distinguishers, and the neural distinguishers were constructed for SM4 algorithm.Drawing inspiration from the idea that ciphertext difference could improve the performance of distinguishers, a new input data format for neural distinguisher was designed by using partial difference information between ciphertext pairs as part of the training data.The residual neural network model was used to construct the neural distinguisher.The training dataset for large blocks was preprocessed.Additionally, an improved strategy for model relearning was proposed to address the high specificity and low sensitivity of the constructed distinguisher.Experimental results show that the proposed deep learning model for SM4 can achieve 9 rounds neural distinguisher.The accuracy of 4~9 rounds distinguishers can reach up to 100%, 76.14%, 65.20%, 59.28%, 55.89% and 53.73% respectively.The complexity and accuracy of the constructed differential neural distinguisher are significantly better than those of traditional differential distinguishers, and it is currently the best neural distinguisher for the block cipher SM4 to our knowledge.It also proves that the deep learning method is effective and feasible in the security analysis of block cipher of large block.…”
    Get full text
    Article
  7. 7447

    Assessing Theoretical Frameworks, Human Resources Management Implications and Emerging Technologies on the Water, Energy and Food (WEF) Nexus by Love David, Omoseni Adepoju

    Published 2021-12-01
    “… The interactions of water, energy, and food resources resulting in WEF nexus thinking have been conceptualized as an integrated framework to achieve the security of the three vital resources. However, there are some gaps in WEF nexus research, which constrains the understanding and actualization of the nexus. …”
    Get full text
    Article
  8. 7448
  9. 7449
  10. 7450

    PREDICTABILITY AND ACCESSIBILITY OF THE LAW by Elena ANGHEL

    Published 2023-06-01
    “…In order for the law to be accepted and respected, it must present a certain legal security, assuming the requirements of accessibility and predictability, logical coherence and stability, features designed to capture the trust of citizens in its provisions. …”
    Get full text
    Article
  11. 7451

    Responsibility for administrative delicts within banking operations by M. Yu. Bukreev

    Published 2018-11-01
    “…The author of the article substantiates the theory of responsibility for administrative delicts within banking operations, namely: security, punitive, management, coercion, obligation, conviction. …”
    Get full text
    Article
  12. 7452

    Traceability permissioned chain consensus mechanism based on double-layer architecture by Qingyang DING, Jianming ZHU, Jin ZHANG, Biao SONG, Yanjing XU, Chuanchang JIA, Zheng GAO

    Published 2019-04-01
    “…The blocks in the blockchain are arranged in chronological and historical order,and the blockchain is incapable of modification through data encryption technology and consensus mechanism,which makes product trace ability to be an important application scenario of blockchain.To choose product information traceability technology,not only the feasibility of the technology but also the market attributes of the product and the producer should be considered,which makes the permissioned chain replace the public chain as an important deployment method of product information traceability.In the existing research results,the research on the traceability license chain mainly focuses on mechanism design and framework construction,and the consensus algorithm applicable to product information traceability is rarely studied.In the process of technology of engineering practice,practical byzantine fault tolerance was chosen more in league chain as the consensus of traceability chain mechanism (such as Hyperledger),but with the increasing number of participating nodes of the traceability chain efficiency will be significantly reduced,and the delay time will be significantly improved,resulting in most of the project is still in the stage of experiment.Based on this,a traceability license chain consensus mechanism based on double-layer architecture (DLPCM) is proposed,and its security is analyzed.Participants are divided into two layers on the vertical dimension,and different consensus mechanisms are adopted at different levels according to different deployment modes of blockchain.Finally,the traceability information query mechanism under the consensus mechanism is introduced,an important reference for the development and design of traceability system based on license chain is provided.…”
    Get full text
    Article
  13. 7453

    An Analysis of the Impact of the Oil Boom on Agriculture and Agricultural Research in Northern Nigeria, 1970-1987 by Sunday Moses Adebayo ALOKO

    Published 2023-07-01
    “… Since the 1970's, food security has eluded Nigeria despite its indisputable agricultural potential and abundant human resources. …”
    Get full text
    Article
  14. 7454

    “Yeni Terörizm”in Geleceğin Güvenlik Ortamına Etkileri: Daeş Örneği by Selim KURT

    Published 2019-12-01
    “…In this context, the effects of the “new terrorism” to future security environment was analyzed in this study through the DAESH terrorist organization, which is one of the best examples of the new terror definition.…”
    Get full text
    Article
  15. 7455
  16. 7456

    Determinants of M-Commerce Platform Adoption Among Individuals in South African Township Communities by Mogau Mashishi, Mpho Primus

    Published 2025-01-01
    “…Social media and perceived security have a significant, positive effect on the trust of South African township residents to adopt m-commerce platforms. …”
    Get full text
    Article
  17. 7457

    Sentinels of environmental change: shifts in fish diversity through the lens of artisanal fishers by Marco Aurélio Alves Santos, Fernando Mayer Pelicice

    Published 2025-02-01
    “…Abstract River regulation has caused significant shifts in fish diversity, with severe impacts on small-scale artisanal fisheries, which depend on fishing resources for income, employment and food security. This study investigated how artisanal fishers perceive changes in fish diversity in response to river regulation, considering four facets: (i) fish abundance, (ii) species records, (iii) capture patterns, and (iv) most valued fish. …”
    Get full text
    Article
  18. 7458

    Enforced disappearances, multiple motherhoods: outlines for a communicational mapping of absences by Alba Shirley Tamayo-Arango, Katherinne Arenas-López

    Published 2021-01-01
    “…Personal conversations permeated the whole process and allowed to secure close communication with the participants. …”
    Get full text
    Article
  19. 7459

    E-Commerce Shop Helviah Skincare Mobile Application by Marlia Sari, Lusia Septia ER, Muhammad Junaidi

    Published 2024-12-01
    “…The application features an intuitive product catalog, a secure payment gateway, personalized recommendations, and real-time order tracking, ensuring a seamless shopping experience. …”
    Get full text
    Article
  20. 7460

    Informal Cross-Border Traders and Food Trade during the Global Pandemic in Zimbabwe by Abel Chikanda

    Published 2025-01-01
    “…More importantly, it demonstrates how the lack of understanding of the contribution of ICBTs to employment generation and urban food security has led to the adoption of policies and practices that do not accommodate informal food trading in the country’s urban landscape. …”
    Get full text
    Article