Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
541
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
Published 2016-05-01“…The scheme proved in this model can only be called selectively secure one. However, from a security perspective, the adaptively secure CP-ABPRE scheme is more desirable. …”
Get full text
Article -
542
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01“…Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme.While achieving message privacy features of the proxy signature conversion.Based on the difficulty of NGBH and Many-NGBH problem,It proves that the new scheme can resist forgery attack characteristics.The scheme satisfies security properties:correctness and message blindness.…”
Get full text
Article -
543
HUMAN SECURITY AND LAND BORDERS CLOSURE: A HISTORICAL PERSPECTIVE
Published 2024-10-01Subjects: Get full text
Article -
544
FUTURE TRENDS OF FORMATION OF THE INTERNATIONAL REGIME ON THE PROVISION OF INFORMATION SECURITY
Published 2016-08-01Subjects: “…information security…”
Get full text
Article -
545
VALUATION OF DEBT SECURITIES FOR THE OBJECTIVES OF ACCOUNTING REPORTING IN THE RUSSIAN BANK
Published 2017-12-01Subjects: “…debt securities…”
Get full text
Article -
546
Monitoring the efficiency of organisation’s internal control and economic security system
Published 2022-03-01Subjects: Get full text
Article -
547
Design method of secure computing protocol for deep neural network
Published 2020-08-01Subjects: Get full text
Article -
548
The Future of Water Resources Management, Water Security and Emerging Problems
Published 2024-01-01Subjects: Get full text
Article -
549
A quantifiable cloud computing platform security evaluation model
Published 2020-07-01Subjects: Get full text
Article -
550
Traffic planning of backbone link of quantum secure communication network
Published 2018-09-01Subjects: “…quantum secure communication network…”
Get full text
Article -
551
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01“…Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS vulnerability including type of the reflective,stored,and DOM,SQL injection vulner-ability and session authentication management vulnerability were studied.The corresponding preventive measures of the three kinds of vulnerabilities were put forward.…”
Get full text
Article -
552
A bibliometric analysis of food security and urbanization: insights and implications
Published 2025-01-01Subjects: “…food security…”
Get full text
Article -
553
‘Bottom-up securitization’: A visual turn in security studies
Published 2024-03-01Subjects: “…international security…”
Get full text
Article -
554
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
555
Application of big data technology in enterprise information security management
Published 2025-01-01Subjects: “…Enterprise information security…”
Get full text
Article -
556
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01“…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
Get full text
Article -
557
Synchronization of hyperchaos of cellular neural network with applications to secure communication
Published 2000-01-01Subjects: Get full text
Article -
558
Security-enhanced live migration based on SGX for virtual machine
Published 2017-09-01“…The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on both sides of migration,a hardware-isolated secure execution environment centered SGX was built.It guaranteed the security of operations like encryption and integrity measurement and also ensured the security of private data.An encrypted channel to transfer migration data based on the remote attestation between the secure execution environments of both migration sides was constructed.And the mutual authentication of both sides’ platform integrity was realized.Finally,the security enhancement effect and did the experiment was analyzed.The results shows that the introduction of SGX won’t cause much negative effect to the migration performance.…”
Get full text
Article -
559
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
560
Land cover, land use, climate change and food security
Published 2023-12-01Subjects: Get full text
Article