Showing 1 - 20 results of 34 for search '"loophole"', query time: 0.05s Refine Results
  1. 1
  2. 2

    Noise pollution in developing countries: Loopholes and recommendations for Vietnam law by Quang Chinh Nguyen, An Thanh Thi Chu, Bao Gia Truong, Duyen Hong Thuc Nguyen

    Published 2025-01-01
    “…This study aims to identify loopholes and recommend solutions for Vietnam with implications for other developing countries. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Design and validation for a remote attestation security protocol by WANG Dan, WEI Jin-feng, ZHOU Xiao-dong

    Published 2009-01-01
    “…By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.…”
    Get full text
    Article
  6. 6

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. …”
    Get full text
    Article
  7. 7

    Beef handling practices at Abattoirs and Butcher shops in Uganda: implications for meat safety and health of consumers by Juliet Kyayesimira, Florence Muheirwe

    Published 2023-04-01
    “…In Uganda particularly, in the recent past, there was whistle-blowing over contaminated beef on the market, indicating a  loophole in food safety. Despite this, studies focusing on beef handling practices have remained scanty. …”
    Get full text
    Article
  8. 8

    Legal protection of community members in the Complete Systematic Land Registration Program by I. Z. Rusmanira, . Sudarsono, M. H. Masykur

    Published 2024-12-01
    “…This decision opens up opportunities for local governments to adopt additional regulations related to the financing of PTSL, which is often a loophole for illegal extortion. This study raises the question of how legal protection of the community in the process of implementing PTSL. …”
    Get full text
    Article
  9. 9

    Beef handling practices at Abattoirs and Butcher shops in Uganda: implications for meat safety and health of consumers by Juliet Kyayesimira, Florence Muheirwe

    Published 2023-04-01
    “…In Uganda particularly, in the recent past, there was whistle-blowing over contaminated beef on the market, indicating a  loophole in food safety. Despite this, studies focusing on beef handling practices have remained scanty. …”
    Get full text
    Article
  10. 10

    Exploring the Users’ Perspective of the Nationwide Self-Exclusion Service for Gambling Disorder, “Spelpaus”: Qualitative Interview Study by Johanna Tjernberg, Sara Helgesson, Anders Håkansson, Helena Hansson

    Published 2025-01-01
    “…However, transfer from self-exclusion to treatment should be facilitated by policy making, and loopholes allowing for breaching of the self-exclusion need to be counteracted.…”
    Get full text
    Article
  11. 11

    Progress and Security Analysis of Quantum Cryptography Communication by Junsen Lai, Bingbing Wu, Shaohui Li, Wenyu Zhao, Haiyi Zhang

    Published 2015-06-01
    “…The quantum key distribution protocol,devices,and network architecture were reviewed. The security loopholes and quantum hacking schemes of practical system were analyzed. …”
    Get full text
    Article
  12. 12

    Research on Telecommunication System Business Security Architecture by Hong Li, Kai Qu

    Published 2013-08-01
    “…The concept of service security was thoroughly analyzed,and the generalized and narrow business security was proposed.The generalized business safety system was divided into five layers,and network security and safety requirements were defined,meanwhile the narrow business security was focused on the security of application layer,which was the concentration of the research.The security of application layer mainly includes two aspects:common vulnerabilities and loopholes in the service logic,which are defined and researched intensively.A security architecture against the security problem of the business-oriented system,and the security architecture taken as a better guideline for the design and implementation of business systems were proposed.…”
    Get full text
    Article
  13. 13

    Countering detector manipulation attacks in quantum communication through detector self-testing by Lijiong Shen, Christian Kurtsiefer

    Published 2025-01-01
    “…In practical quantum key distribution systems, imperfect physical devices open security loopholes that challenge the core promise of this technology. …”
    Get full text
    Article
  14. 14

    Securing guarantee of the blockchain network:attacks and countermeasures by Peipei JIANG, Qian WANG, Yanjiao CHEN, Qi LI, Chao SHEN

    Published 2021-01-01
    “…While the security of blockchain has been the central concern of both academia and industry since the very start, new security threats continue to emerge, which poses great risks to the blockchain ecosystem.A systematic study was conducted on the most state-of-the-art research on potential security issues of blockchain.Specifically, a taxonomy was developed by considering the blockchain framework as a four-layer system, and the analysis on the most recent attacks against security loopholes in each layer was provided.Countermeasures that can strengthen the blockchain were also discussed by highlighting their fundamental ideas and comparing different solutions.Finally, the forefront of research and potential directions of blockchain security were put forward to encourage further studies on the security of blockchain.…”
    Get full text
    Article
  15. 15

    Functional requirements and design of simulation cloud platform for data center by Junwen LIU, Jiaxing XUAN

    Published 2017-05-01
    “…Electric power information system is related with the safe operation of grid.To ensure the running stability of information system,comprehensive test was needed to conduct before the system is running.Considering actual needs of the power industry at present,it's necessary to establish independent environment to conduct function of in-formation system and non-functional test so as to achieve effective operation and maintenance of information system,finding loopholes and improving robustness of the system.Based on the analysis of development of cloud data center simulation platform,the research studies construction technology,which applies to the data center cloud platform and puts forward deployment implementation plan targeted to functional requirements of platform.In this way,the guid-ance role of construction was achieved on the later cloud platform.…”
    Get full text
    Article
  16. 16

    Bulky Vehicles Recycling. Part 1 - Conditions for Recycling by Anna Matuszewska, Piotr Wieczorek, Izabela Samson-Bręk

    Published 2020-12-01
    “…This article describes the loopholes that have prevented end-of-life vehicles from currently being recycled.  …”
    Get full text
    Article
  17. 17

    An improved RFID authentication protocol based on quadratic residue by Zhiliang LIU

    Published 2018-04-01
    “…In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.…”
    Get full text
    Article
  18. 18

    ASSESSMENT OF THE IMPACTS OF BUSINESS ENVIRONMENT ON THE DEVELOPMENT OF VIETNAMESE SMEs: EVIDENCE FROM THE ENTERPRISE SURVEY by Nguyễn Quốc Định

    Published 2018-03-01
    “…Based on the rigorous analysis, some possible recommendations are provided: (i) Expanding application of information technology in tax administration; (ii) Reducing complicated sub-licenses and administrative procedures; (iii) Reducing business risks of firms by establishing a specific business strategy and long-term vision; and (iv) Decreasing the chances of corruption by simplifying and rationalizing the regulatory loopholes as well as increasing transparency in making laws/policies.…”
    Get full text
    Article
  19. 19

    The palpable dichotomy between animal cruelty laws and implementation – Is there a way forward for Indian jurisprudence? by Bhavya Johari

    Published 2024-10-01
    “…It argues that the primary issue lies not in the lack of animal protection legislation but in the loopholes and inadequacies of the current laws, which often fail to hold perpetrators accountable for their actions. …”
    Get full text
    Article
  20. 20

    Implicit bias among health care providers and its influence on African Americans - A critical analysis by Khushboo PATEL

    Published 2020-09-01
    “…All the studies discussed in the present article make use of the Implicit Association Test (IAT) in order to measure implicit bias. Due to some loopholes of the measure, the article aimed to provide future directions in order to overcome the limitations of the existing research on implicit bias by proposing alternate methodological considerations.…”
    Get full text
    Article