Showing 821 - 840 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 821
  2. 822
  3. 823

    Verification of serialising instructions for security against transient execution attacks by Kushal K. Ponugoti, Sudarshan K. Srinivasan, Nimish Mathure

    Published 2023-07-01
    “…However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. …”
    Get full text
    Article
  4. 824

    Research on bionic mechanism based endogenous security defense system by Aiqun HU, Lanting FANG, Tao LI

    Published 2021-02-01
    Subjects: “…endogenous security…”
    Get full text
    Article
  5. 825
  6. 826

    Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks by Tung-Shih Su, Mei-Wen Huang, Wei-Shou Li, Wen-Shyong Hsieh

    Published 2012-07-01
    “…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.…”
    Get full text
    Article
  7. 827
  8. 828
  9. 829
  10. 830
  11. 831

    Enhancing Security in International Data Spaces: A STRIDE Framework Approach by Nikola Gavric, Andrii Shalaginov, Aliaksei Andrushevich, Andreas Rumsch, Andrew Paice

    Published 2024-12-01
    “…Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. …”
    Get full text
    Article
  12. 832
  13. 833

    Key technology and application of intelligent connected patrol vehicles for security scenario by Yuchao LIU, Ziyue LI

    Published 2020-04-01
    “…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
    Get full text
    Article
  14. 834

    Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security by Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari

    Published 2025-01-01
    “…Quantum Key Distribution (QKD) provides secure communication by leveraging quantum mechanics, with the BB84 protocol being one of its most widely adopted implementations. …”
    Get full text
    Article
  15. 835
  16. 836

    A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System by Ruikang Zhou, Yingxu Lai, Zenghui Liu, Yinong Chen, Xiangzhen Yao, Jiezhong Gong

    Published 2016-03-01
    “…By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. …”
    Get full text
    Article
  17. 837

    An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security by Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. …”
    Get full text
    Article
  18. 838
  19. 839
  20. 840