Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
721
GUC-secure protocol for private relational join operator computing
Published 2014-11-01Subjects: “…secure multiparty computation…”
Get full text
Article -
722
5G MEC system security capability deployment scheme
Published 2022-11-01Subjects: Get full text
Article -
723
LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation
Published 2021-01-01“…Yashar et al. recently proposed a secure key exchange scheme for the fog federation. …”
Get full text
Article -
724
Endogenous security common problems and solutions of the mobile communication networks
Published 2022-09-01Subjects: Get full text
Article -
725
SDN security prediction method based on bayesian attack graph
Published 2021-11-01Subjects: “…SDN security prediction…”
Get full text
Article -
726
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01Subjects: Get full text
Article -
727
Ontological security dynamics in the EU accession process of North Macedonia
Published 2024-01-01Subjects: “…ontological security…”
Get full text
Article -
728
Security Mechanism for Dual Stack Network Accessing of Home Gateway
Published 2014-12-01“…Secondly, three methods were given to solve the security problems. At last, a realization and experiment result was given.…”
Get full text
Article -
729
Legal regulation of relations connected to service in the Security Service of Ukraine
Published 2023-12-01Subjects: Get full text
Article -
730
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Subjects: “…Smart home security…”
Get full text
Article -
731
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01Subjects: Get full text
Article -
732
Analysis and Improvement of Key Distribution Scheme for Secure Group Communication
Published 2016-01-01“…In a secure group communication, messages between a group coordinator and members are protected by session keys. …”
Get full text
Article -
733
The Study of Methods for Penetration Testing in Training of Information Security Specialists
Published 2016-12-01“…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
Get full text
Article -
734
Protocol to enhance the security of Early data in TLS 1.3
Published 2017-12-01Subjects: Get full text
Article -
735
METHOD OF MAKING MANAGEMENT DECISION ON FINANCING THE ECONOMIC SECURITY OF ORGANIZATION
Published 2017-01-01Subjects: “…economic security…”
Get full text
Article -
736
Secure Satellite Downlink With Hybrid RIS and AI-Based Optimization
Published 2025-01-01Subjects: Get full text
Article -
737
Security against differential and linear cryptanalysis for general SPT models
Published 2012-01-01“…To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the layer for permutation.The upper bound of the maximum differentia lity was given when the branch number of P was optimal,and the upper bound of the maximum linear approximation probability and the maximum linear hull probability are given when the branch number of P was optimal and when S and T were balanced.As a consequence,the problem about evaluating the security against differential and linear cryptanalysis for general SPT models was resolved partially.…”
Get full text
Article -
738
Security evaluation against differential cryptanalysis for dynamic cryptographic structure
Published 2021-08-01“…For CLEFIA cryptographic structure, a dynamic cryptographic structure was put forward.The main feature of the dynamic cryptographic structure was that the diffusion layer in the 6t(t≥1)th round could be selected arbitrarily from some linear bijection on {0,1}<sup>4</sup>.By analysing the transfer law of 6-round differential characteristic, security evaluation against differential cryptanalysis for all structures of the dynamic cryptographic structure was given.The results show that, under the condition that the round functions are all bijective, there are at least l active round functions for l-round differential characteristic when l is 6k(k≥1) or 6k+1(k≥3), and otherwise there are at least l-1 active round functions for l-round differential characteristic.…”
Get full text
Article -
739
Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities
Published 2025-01-01“…This integration not only enhances the security posture of smart cities but also provides a foundation for future advancements in urban cybersecurity. …”
Get full text
Article -
740
Research on network slicing security for 5G mMTC
Published 2022-02-01“…With the emergence of new 5G business, architecture and technology, more and more researchers pay attention to security issues and potential security risks.Massive machine type communication is one of the three major application scenarios of 5G.It provides high performance such as large connection and low power consumption.Due to factors such as limited resources of MTC equipment, it may also weaken the security of 5G networks.At the same time, different scenarios and applications have obvious demands for network performance, service quality and security level.The flexibility of 5G networking is realized by network slicing technology.It meets the diversity and customization of 5G network services, but also brings new security threats.5G commercial rapid development.The number of IoT devices has increased exponentially.In order to ensure that 5G networks provide more efficient and safe on-demand services, it is particularly important to study the security mechanism and strategy of network slicing for 5G mMTC application scenarios.Therefore, the characteristics and security requirements of 5G mMTC were analyzed.The main security threats of network slicing were listed.In view of the above security requirements and threats, the contribution and deficiency of existing security schemes around the aspects of specific network slice authentication, slice security isolation, security management and arrangement were summarized and expounded.And the future research in this field was prospected.A SM2-based secondary authentication and security isolation model for 5G mMTC network slicing was proposed.This model framework meeted the efficiency of large-scale authentication for 5G devices and users by introducing batch authentication and pre-authentication mechanisms.By hierarchical encryption of different communication data, the security isolation between 5G mMTC network slices was realized.The performance and security of the model were also analyzed.…”
Get full text
Article