Showing 1,201 - 1,220 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 1201

    APPROACH TO ECONOMIC SECURITY ORGANIZATION BASED ON PROBLEM-SOLVING TYPE CLOSED CIRCLE by A. Savin

    Published 2016-07-01
    Subjects: “…economic security of organization…”
    Get full text
    Article
  2. 1202
  3. 1203
  4. 1204
  5. 1205
  6. 1206
  7. 1207

    Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users by Vanga Anil, S. L. Arun

    Published 2025-01-01
    “…However, TES is facing critical challenges in security and economics. Security concerns include data integrity, authentication, confidentiality, scalability, and privacy, while economic challenges involve penalty reduction and market liquidity. …”
    Get full text
    Article
  8. 1208

    Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key by Xincheng YAN, Yue CHEN, Hongyong JIA, Yanru CHEN, Xinyue ZHANG

    Published 2018-05-01
    “…The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key,while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem,a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption,mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key,which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker,which can also enhance the system’s active security defense capability.…”
    Get full text
    Article
  9. 1209
  10. 1210
  11. 1211

    Secure Two-Party Decision Tree Classification Based on Function Secret Sharing by Kun Liu, Chunming Tang

    Published 2023-01-01
    “…This paper proposes a novel framework for secure two-party decision tree classification that enables collaborative training and evaluation without leaking sensitive data. …”
    Get full text
    Article
  12. 1212
  13. 1213

    Wireless sensor network for fire detection with network coding to improve security and reliability by Johannes Braun, Faouzi Derbel

    Published 2025-02-01
    “…This article proposes a wireless sensor network (WSN) for fire alarm systems that leverages network coding to enhance system reliability and security. The proposed WSN is designed to comply with European standards, with a particular focus on German standards, and enables the deployment of sensor nodes that automatically construct a robust and reliable network. …”
    Get full text
    Article
  14. 1214

    Beyond full‐bit secure authenticated encryption without input‐length limitation by Akiko Inoue

    Published 2022-07-01
    Subjects: “…beyond birthday‐bound security…”
    Get full text
    Article
  15. 1215
  16. 1216
  17. 1217

    An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks by Qiang Zhou, Geng Yang, Liwen He

    Published 2014-01-01
    “…This paper proposes a novel secure data aggregation scheme based on homomorphic primitives in WSNs (abbreviated as SDA-HP). …”
    Get full text
    Article
  18. 1218

    Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA

    Published 2012-04-01
    “…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
    Get full text
    Article
  19. 1219

    FROM THE VIEW OF THE COMMUNIST PARTY OF VIETNAM TO THE PRACTICE OF BUILDING SOCIAL SECURITY IN DANANG by Lê Đức Thọ

    Published 2017-12-01
    “…This article analyzes the views of the Communist Party of Vietnam on social security implementation in the current period; Analyzes the situation of social security in Danang and thereby suggests some solutions to improve social security for people in Danang city today.…”
    Get full text
    Article
  20. 1220