Showing 221 - 240 results of 9,720 for search '"security"', query time: 0.06s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224

    Method of designing security protocol for remote attestation by YU Rong-wei1, WANG Li-na1, KUANG Bo1

    Published 2008-01-01
    “…By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability.…”
    Get full text
    Article
  5. 225
  6. 226
  7. 227
  8. 228

    Theoretical Aspects of Analysis of International Environmental Security by J. A. Rusakova

    Published 2015-10-01
    “…Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. …”
    Get full text
    Article
  9. 229
  10. 230
  11. 231
  12. 232
  13. 233
  14. 234

    Data security for internet plus in public cloud by Yongjian WANG, Aibo SONG, Yawei YE, Haibo JIANG

    Published 2017-10-01
    “…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
    Get full text
    Article
  15. 235
  16. 236
  17. 237
  18. 238
  19. 239
  20. 240