Showing 681 - 700 results of 9,720 for search '"security"', query time: 0.12s Refine Results
  1. 681
  2. 682

    EDSM:secure and efficient scalar multiplication algorithm on Edwards curves by ZHANG Bao-hua1, YIN Xin-chun2, ZHANG Hai-ling2

    Published 2008-01-01
    “…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
    Get full text
    Article
  3. 683
  4. 684
  5. 685

    A Secure and Efficient White-Box Implementation of SM4 by Xiaobo Hu, Yanyan Yu, Yinzi Tu, Jing Wang, Shi Chen, Yuqi Bao, Tengyuan Zhang, Yaowen Xing, Shihui Zheng

    Published 2024-12-01
    “…Although researchers have made great efforts to enhance security against DCA, most solutions considerably decrease algorithmic efficiency. …”
    Get full text
    Article
  6. 686

    The War in Ukraine, Agricultural Trade and Risks to Global Food Security by Thomas Glauben, Miranda Svanidze, Linde Götz, Sören Prehn, Tinoush Jamali Jaghdani, Ivan Đurić, Lena Kuhn

    Published 2022-06-01
    “…Abstract Any calls to move towards a centrally planned economy or autarky are strongly advised against, as this would only be to the detriment of food security in the Global South.…”
    Get full text
    Article
  7. 687

    Changing role of security alliances in the post-Cold War era by I. A. Istomin, A. V. Levchenko

    Published 2024-07-01
    “…In the aftermath of the Cold War, both scholars and experts frequently questioned the political relevance of security alliances, given the declining intensity of armed conflicts and the decreasing probability of major interstate wars. …”
    Get full text
    Article
  8. 688
  9. 689

    Secured Routing Protocol for Improving the Energy Efficiency in WSN Applications by Y. P. Makimaa, R. Sudarmani

    Published 2024-01-01
    “…The data have been saved using a variety of security procedures that have been developed in past research studies. …”
    Get full text
    Article
  10. 690

    Study of BGP secure scheme based on divide and conquer strategy by Bin WANG, Jin-liang AN, Chun-ming WU, Ju-long LAN

    Published 2012-05-01
    Subjects: “…border gateway protocol security…”
    Get full text
    Article
  11. 691
  12. 692
  13. 693
  14. 694
  15. 695
  16. 696
  17. 697

    A Clonal Selection Optimization System for Multiparty Secure Computing by Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu, Xiang Wu

    Published 2021-01-01
    “…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
    Get full text
    Article
  18. 698

    MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY by N. Unizhayev

    Published 2016-03-01
    “…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
    Get full text
    Article
  19. 699
  20. 700

    Secure data collection method of WSN based on mobile Sink by Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG

    Published 2021-02-01
    “…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
    Get full text
    Article