Showing 801 - 820 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 801

    THE ROLE OF INTERNATIONAL LEGAL INSTRUMENTS IN THE FORMATION OF A SECURITY ENVIRONMENT by Vladyslav Hrichanichenko

    Published 2024-05-01
    Subjects: “…security environment, international legal instrument, information security, international terrorism, international obligations.…”
    Get full text
    Article
  2. 802

    Logic-Based Security Architecture for Systems Providing Multihop Communication by Iman Almomani, Eman Al-Banna, Mousa AL-Akhras

    Published 2013-01-01
    “…Security is a basic element of distributed systems such as ad hoc and sensor communication networks. …”
    Get full text
    Article
  3. 803
  4. 804
  5. 805
  6. 806
  7. 807
  8. 808
  9. 809

    Secure resource metering and accounting with hash chain in cloud storage by Mei LIU, Ge FU, Yi-xi LI, Hong ZHANG, Xin-ran LIU, Cui-lan DU

    Published 2013-08-01
    “…Therefore, the trustworthiness between payer and service provider becomes a key factor for the business, and triggers security concerns. On the one hand, service providers or insiders may inflate the amount of re-source consumed to get more service charge. …”
    Get full text
    Article
  10. 810
  11. 811
  12. 812

    Fast anomalous traffic detection system for secure vehicular communications by Qasem Abu Al-Haija, Abdulaziz A. Alsulami

    Published 2024-12-01
    “…Despite its ubiquitous use, the CAN protocol lacks critical security features, making vehicle communications vulnerable to message injection attacks. …”
    Get full text
    Article
  13. 813
  14. 814

    A Resilience-Based Security Assessment Approach for CBTC Systems by Ruiming Lu, Huiyu Dong, Hongwei Wang, Dongliang Cui, Li Zhu, Xi Wang

    Published 2021-01-01
    “…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
    Get full text
    Article
  15. 815
  16. 816
  17. 817

    An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment by Sudha Devi Dorairaj, Thilagavathy Kaliannan

    Published 2015-01-01
    “…Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. …”
    Get full text
    Article
  18. 818
  19. 819

    Secure network coding method merged with timestamp and homomorphic signature by Heng-li PEI, Tao SHANG, Jian-wei LIU

    Published 2013-04-01
    “…A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed.The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of net it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature.The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding a security of the proposed scheme.Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously,and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.…”
    Get full text
    Article
  20. 820

    Shaping the future of commercial quantum computer and the challenge for information security by Chao WANG, Yun-jiang WANG, Feng HU

    Published 2016-03-01
    “…The modern cryptography still has strong security. Take the quantum devices constraints into consideration was proposed for the first time, the storage of former registers in the Shor algorithm should be 100 or less Qubits theoretically decreased from 1 000 or more Qubits. …”
    Get full text
    Article