Showing 1,081 - 1,100 results of 4,865 for search '"privateering"', query time: 0.06s Refine Results
  1. 1081

    Public key based key distribution scheme for wireless sensor networks by HUANG Jie1, HUANG Bei1

    Published 2011-01-01
    “…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public key set and a hash function in base station.Each sensor device was pre-distributed one public/private pair-wise key from public key set and a public key subset from the initial public keys set.Owing to uniqueness of private key,not only the communication security problems could be improved for WSN.but also the sensor-memory cost could be decreased.With the theorem of random-graph theory,the connectivity and scalability were illustrated.The results showed that the scheme was superior to the traditional key pre-distribution schemes.…”
    Get full text
    Article
  2. 1082

    À propos des espaces d’enseignement et des salles de conférence dans le monde romain by Michèle Villetard

    Published 2020-12-01
    “…When teaching was performed outdoors, in private or public areas, there was no fence except sometimes light and perishable structures. …”
    Get full text
    Article
  3. 1083

    Research and practice of software-defined security technology architecture in the 5G+ era by Shuo QUAN, Xuliang WANG, Zeya ZHU

    Published 2021-12-01
    “…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
    Get full text
    Article
  4. 1084

    Regulating a Firm under Adverse Selection and Moral Hazard in Uncertain Environment by Jing Feng, Yanfei Lan, Ruiqing Zhao

    Published 2014-01-01
    “…This paper investigates a problem of how to regulate a firm which has private information about the market capacity, leading to adverse selection, and which can increase the market demand by exerting costly effort, resulting in moral hazard. …”
    Get full text
    Article
  5. 1085

    The Emotional Museum. Thoughts on the “Secular Relics” of Nineteenth-Century History Museums in Paris and their Posterity by Felicity Bodenstein

    Published 2011-04-01
    “…This article examines the discourse elaborated in Paris’ historical museums during the nineteenth century through the display of personal, private objects “having belonged to” famous historical figures, artistes and writers. …”
    Get full text
    Article
  6. 1086

    Multi-authority attribute-based identification scheme by Fei TANG, Jiali BAO, Yonghong HUANG, Dong HUANG, Huili WANG

    Published 2021-03-01
    “…Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance.…”
    Get full text
    Article
  7. 1087
  8. 1088
  9. 1089
  10. 1090
  11. 1091

    Research of the investment results of pension savings by G. F. Fatkhlislamova

    Published 2018-12-01
    “…This article makes a research of current trends in the investment of pension savings of citizens, transferred to the trust management of the state management company Vnesheconombank, non-state pension funds and private management companies for the period from 2005 to 2017. …”
    Get full text
    Article
  12. 1092
  13. 1093
  14. 1094
  15. 1095
  16. 1096

    U SENCI DREVNOG DRUŠTVA: ENGELSOVO POREKLO PORODICE by Ivan Matić

    Published 2021-05-01
    “…The Origin of the Family, Private Property and the State. New York: Pathfinder Press, 180 p.)…”
    Article
  17. 1097

    Les Juifs du Maghreb à Toulouse des années 1950 à nos jours. Une insertion réussie ? by Colette Zytnicki

    Published 2015-10-01
    “…It looks into the social integration process and identity reconstructions, from both private and public standpoints.…”
    Get full text
    Article
  18. 1098

    Compte-rendu de « Black Dolls, la collection Deborah Neff » by Emmanuel Falguières

    Published 2018-11-01
    “…From February 23rd to May 20th 2018, the Parisian exhibition space La maison rouge presents for the first time outside of the United States Deborah Neff private collection of black dolls.…”
    Get full text
    Article
  19. 1099
  20. 1100