Suggested Topics within your search.
Suggested Topics within your search.
- Economic aspects 2
- Leadership 2
- Public-private sector cooperation 2
- Trusts and trustees 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Administrative law 1
- Agricultural industries 1
- Agriculture 1
- Business networks 1
- Civil law 1
- Climate Change 1
- Community development 1
- Digital techniques 1
- Digitale Photographie 1
- Domestic relations 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Education, Higher 1
- Ego (Psychology) 1
- Environmental Health 1
- Equity 1
- Evaluation 1
- Families 1
- Fiction 1
- Foreign trade regulation 1
- General 1
- Hastings, Stanley (Fictitious character) 1
- Health insurance 1
- Health insurance claims 1
-
1081
Public key based key distribution scheme for wireless sensor networks
Published 2011-01-01“…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public key set and a hash function in base station.Each sensor device was pre-distributed one public/private pair-wise key from public key set and a public key subset from the initial public keys set.Owing to uniqueness of private key,not only the communication security problems could be improved for WSN.but also the sensor-memory cost could be decreased.With the theorem of random-graph theory,the connectivity and scalability were illustrated.The results showed that the scheme was superior to the traditional key pre-distribution schemes.…”
Get full text
Article -
1082
À propos des espaces d’enseignement et des salles de conférence dans le monde romain
Published 2020-12-01“…When teaching was performed outdoors, in private or public areas, there was no fence except sometimes light and perishable structures. …”
Get full text
Article -
1083
Research and practice of software-defined security technology architecture in the 5G+ era
Published 2021-12-01“…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
Get full text
Article -
1084
Regulating a Firm under Adverse Selection and Moral Hazard in Uncertain Environment
Published 2014-01-01“…This paper investigates a problem of how to regulate a firm which has private information about the market capacity, leading to adverse selection, and which can increase the market demand by exerting costly effort, resulting in moral hazard. …”
Get full text
Article -
1085
The Emotional Museum. Thoughts on the “Secular Relics” of Nineteenth-Century History Museums in Paris and their Posterity
Published 2011-04-01“…This article examines the discourse elaborated in Paris’ historical museums during the nineteenth century through the display of personal, private objects “having belonged to” famous historical figures, artistes and writers. …”
Get full text
Article -
1086
Multi-authority attribute-based identification scheme
Published 2021-03-01“…Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance.…”
Get full text
Article -
1087
-
1088
-
1089
Extraction of Water Treatment Coagulant from Locally Abundant Kaolin Clays
Published 2015-01-01Get full text
Article -
1090
Treatment of the rectocele caused by pelvic floor muscles incompetence in women
Published 2018-08-01Get full text
Article -
1091
Research of the investment results of pension savings
Published 2018-12-01“…This article makes a research of current trends in the investment of pension savings of citizens, transferred to the trust management of the state management company Vnesheconombank, non-state pension funds and private management companies for the period from 2005 to 2017. …”
Get full text
Article -
1092
Porous Materials to Support Bilayer Lipid Membranes for Ion Channel Biosensors
Published 2011-01-01Get full text
Article -
1093
Response to Radioiodine Therapy for Thyrotoxicosis: Disparate Outcomes for an Indigenous Population
Published 2016-01-01Get full text
Article -
1094
A Novel Robotic Technique for Mapping Patellofemoral Kinematics in Total Knee Arthroplasty
Published 2025-02-01Get full text
Article -
1095
Optimal (Control of) Intervention Strategies for Malaria Epidemic in Karonga District, Malawi
Published 2014-01-01Get full text
Article -
1096
U SENCI DREVNOG DRUŠTVA: ENGELSOVO POREKLO PORODICE
Published 2021-05-01“…The Origin of the Family, Private Property and the State. New York: Pathfinder Press, 180 p.)…”
Article -
1097
Les Juifs du Maghreb à Toulouse des années 1950 à nos jours. Une insertion réussie ?
Published 2015-10-01“…It looks into the social integration process and identity reconstructions, from both private and public standpoints.…”
Get full text
Article -
1098
Compte-rendu de « Black Dolls, la collection Deborah Neff »
Published 2018-11-01“…From February 23rd to May 20th 2018, the Parisian exhibition space La maison rouge presents for the first time outside of the United States Deborah Neff private collection of black dolls.…”
Get full text
Article -
1099
Lie Group Classification of a Generalized Lane-Emden Type System in Two Dimensions
Published 2012-01-01Get full text
Article -
1100
Solutions and Conservation Laws of a (2+1)-Dimensional Boussinesq Equation
Published 2013-01-01Get full text
Article