Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
341
Research on vulnerability and security technology of industrial Ethernet protocol
Published 2017-11-01Subjects: Get full text
Article -
342
Design and implementation of secure Windows platform based on TCM
Published 2015-08-01Subjects: Get full text
Article -
343
Security analysis and improvement of a certificateless signcryption scheme
Published 2015-03-01“…To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently,Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. A strongly secure certificateless signcryption without bilinear pairings was also proposed, which was provably secure in the random oracle model under the assumption that the discrete logarithm problem and the computational Diffie-Hellman problems were intractable. …”
Get full text
Article -
344
Modified security model based on dynamic trusted degree
Published 2008-01-01Subjects: “…security architecture…”
Get full text
Article -
345
Improving the information security sustainability of the economy financial sector
Published 2023-06-01“…The study analyzes the main activities of Russia Bank, aimed at ensuring the sustainability of information security in the financial sector of the economy, as well as ongoing activities aimed at limiting the spread of cybercrime based on an automated incident handling system. …”
Get full text
Article -
346
Systematic literature review on Internet-of-Vehicles communication security
Published 2018-12-01“…As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. …”
Get full text
Article -
347
Universally composable secure multiparty computation protocol with fairness
Published 2014-02-01Subjects: Get full text
Article -
348
Research on software-defined network and the security defense technology
Published 2017-11-01Subjects: Get full text
Article -
349
Secure vehicular digital forensics system based on blockchain
Published 2020-06-01Subjects: Get full text
Article -
350
Research on security architecture of strong PUF by adversarial learning
Published 2021-06-01“…To overcome the vulnerability of strong physical unclonable function, the adversarial learning model of strong PUF was presented based on the adversarial learning theory, then the training process of gradient descent algorithm was analyzed under the framework of the model, the potential relationship between the delay vector weight and the prediction accuracy was clarified, and an adversarial sample generation strategy was designed based on the delay vector weight.Compared with traditional strategies, the prediction accuracy of logistic regression under new strategy was reduced by 5.4% ~ 9.5%, down to 51.4%.The physical structure with low overhead was designed corresponding to the new strategy, which then strengthened by symmetrical design and complex strategy to form a new PUF architecture called ALPUF.ALPUF not only decrease the prediction accuracy of machine learning to the level of random prediction, but also resist hybrid attack and brute force attack.Compared with other PUF security structures, ALPUF has advantages in overhead and security.…”
Get full text
Article -
351
Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization
Published 2025-01-01Subjects: Get full text
Article -
352
-
353
Violation of human rights as the basis for the threats to international security
Published 2021-12-01Subjects: Get full text
Article -
354
Delay and energy minimization for MEC-based secure communication
Published 2020-11-01Subjects: Get full text
Article -
355
FOOD SECURITY IN SOUTH ASIA: MAJOR CHALLENGES AND SOLUTIONS
Published 2018-05-01Subjects: Get full text
Article -
356
Problems of economic security management of the enterprises of the aviation industry
Published 2018-12-01Subjects: Get full text
Article -
357
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
358
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Published 2014-01-01“…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
Get full text
Article -
359
WORLD EXPERIENCE IN ADMINISTRATIVE AND LEGAL SUPPORT OF FOOD SECURITY
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
360
An Efficient Data Analysis Framework for Online Security Processing
Published 2021-01-01“…Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. …”
Get full text
Article