Showing 701 - 720 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 701
  2. 702

    PHILOSOPHY OF WAR AND PEACE: IN SEARCH OF NEW EUROPEAN SECURITY STRATEGY by O. O. Bazaluk, D. B. Svyrydenko

    Published 2017-12-01
    Subjects: “…european security strategy…”
    Get full text
    Article
  3. 703

    Modeling and security analysis of hardware trojan attack based on GSCPN by MEI Bo, GUO Wei, CAO Zhipeng, LI Peijie, ZHANG Wenbo

    Published 2024-08-01
    “…Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack and security assessment model based on the generalized stochastic coloring Petri net (GSCPN) was proposed. …”
    Get full text
    Article
  4. 704
  5. 705
  6. 706
  7. 707

    Partially blind proxy re-signature scheme with proven security by Xiaodong YANG, Chunlin CHEN, Ping YANG, Faying AN, Tingchun MA, Caifen WANG

    Published 2018-02-01
    “…In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially blind proxy re-signature was also given.Based on the improved Shao scheme,a partially blind proxy re-signature scheme in the standard model was proposed.The proposed scheme allows proxy to add some public information negotiated by delegatee and proxy to re-signature.The scheme not only can achieve the transparent signature conversion from delegatee to proxy and protect privacy of message re-signed by proxy,but also prevented illegal use of re-signature.Analysis results show that the proposed scheme is correct,multi-use,partially blind and existentially unforgeable.It is more suitable for e-government data exchange system,cross-domain authentication system and so on.…”
    Get full text
    Article
  8. 708
  9. 709
  10. 710
  11. 711

    Survey on rail transit mobile edge computing network security by Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG

    Published 2023-04-01
    “…The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.…”
    Get full text
    Article
  12. 712

    Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency by Alessio Ferone, Stefano Verrilli

    Published 2025-01-01
    “…In particular, we demonstrate how blockchain can improve critical aspects of the security and transparency of digital twins by analyzing a real-world scenario and evaluating produced experimental data. …”
    Get full text
    Article
  13. 713

    Assessment of Economic Management of Land Resources to Enhance Food Security by Dinara Tleshpayeva, Natalia Bondarenko, Mikhail Leontev, Galina Mashentseva, Julia Plaksa, Andrey Zharov, Diana Stepanova, Agzhan Karbozova

    Published 2025-01-01
    “… To achieve the goals of balanced development of the agricultural sector to ensure food security, there is a need to improve management processes in the sphere of agricultural land use. …”
    Get full text
    Article
  14. 714

    The Role of Security Perception and Usage Impact of Mobile Accounting Applications by Isna Ardila, Masta Sembiring, Rini Astuti

    Published 2025-01-01
    Subjects: “…technology acceptance model; mobile accounting application; security perception.…”
    Get full text
    Article
  15. 715
  16. 716
  17. 717
  18. 718
  19. 719

    Optimal Management of Computer Network Security in the Era of Big Data by Minfeng Chen

    Published 2022-01-01
    “…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
    Get full text
    Article
  20. 720