Showing 841 - 860 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 841

    Secure outsource computing scheme of modular exponentiation based on single server by Weijie DING

    Published 2018-01-01
    “…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
    Get full text
    Article
  2. 842
  3. 843

    Data update algorithm based on secure network coding in cloud environment by Hao WU, Cheng-zhe LAI, Jiu-lun FAN, Jian-hua LIU

    Published 2017-05-01
    “…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
    Get full text
    Article
  4. 844
  5. 845

    Climate change, economic security, and macroeconomic stability: Insights from the EU by Lobonț Oana-Ramona, Vătavu Sorana, Nicolescu Ana-Cristina, Trip Andrei, Costea Florin

    Published 2025-01-01
    “…This research examines the impact of climate change risks on the macroeconomic situation and the security of the economic system in the EU-27 during the 2002-2020 period. …”
    Get full text
    Article
  6. 846
  7. 847
  8. 848
  9. 849
  10. 850
  11. 851
  12. 852

    HERDSMEN AND FARMERS CLASHES IN NORTH CENTRAL NIGERIA: NATIONAL SECURITY IMPLICATIONS by ANGELA AJODO-ADEBANJOKO, ROSEMARY IJEOMA NWOFOR

    Published 2024-07-01
    “…This paper examines the national security implications of herdsmen and farmers conflict on Nigerian national security. …”
    Get full text
    Article
  13. 853
  14. 854
  15. 855

    Research on national security risk assessment model of open government data by Biao WANG, Xingyang LIU, Ka XU, Wangyang LIU, Kenan WANG, Yuqing XIA

    Published 2020-12-01
    “…As an important strategic resource of national and social development,the government open data is of great value.But China lack standards in the security risk assessment of government open data,especially the security of national data is at risk.Based on the theory of information security risk assessment,a government open data security risk assessment model was constructed with national security assets,open data vulnerability and security threat as the main security risk elements.Analytic hierarchy process (AHP) and fuzzy comprehensive evaluation methods were used to quantify and evaluate the security risks of government open data,and the validity of the model is verified by example.…”
    Get full text
    Article
  16. 856
  17. 857
  18. 858
  19. 859
  20. 860