Showing 8,721 - 8,740 results of 9,720 for search '"security"', query time: 0.06s Refine Results
  1. 8721

    Direct anonymous authentication scheme for wireless networks under trusted computing by YANG Li1, MA Jian-feng 1, PEI Qing-qi2, MA Zhuo 1

    Published 2010-01-01
    “…Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance.…”
    Get full text
    Article
  2. 8722

    Novel mobile agent dynamic data integrity protection protocol by LI Peng-fei1, QING Si-han2, MA Heng-tai1, DENG Yong1

    Published 2007-01-01
    “…Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.…”
    Get full text
    Article
  3. 8723

    Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia by Richard J. Henny, Jianjun Chen, Terri A. Mellich

    Published 2009-06-01
    “…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
    Get full text
    Article
  4. 8724

    New affiliation-hiding authenticated key exchange protocol by Ya-min WEN, Zheng GONG

    Published 2015-09-01
    “…A new affiliation-hiding authenticated key agreement protocol was proposed.The proposal enables two anonymous users to accomplish a successful secret authentication and key agreement when their groups set intersection is non-empty and the cardinality of the set intersection should not be less than a threshold value.Meanwhile,the affiliations of groups outside of the set intersection remain confidential.The proposal is provably secure under the random oracle model,and the performance of the scheme is still competitive.…”
    Get full text
    Article
  5. 8725

    Impending Carotid Blowout Stabilization Using an LT-D Tube by G. Desuter, A. Gregoire, Q. Gardiner, P. M. Francois

    Published 2014-01-01
    “…Reducing the bleeding and securing the airway are essential before more definitive management. …”
    Get full text
    Article
  6. 8726

    Identity-based incremental signature scheme from lattices by Miaomiao TIAN, Jing CHEN, Hong ZHONG

    Published 2021-01-01
    “…By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against adaptive chosen identity and chosen message attacks in the standard model, assuming the hardness of the small integer solution problem.Theoretical analysis and experimental results show that the computational overhead of the incremental signature algorithm is less than that of the standard signature algorithm.…”
    Get full text
    Article
  7. 8727

    Approche clinique et didactique de l’inclusion des élèves porteurs de troubles du comportement by Sylvie Canat-Faure, Capucine Huet

    Published 2022-09-01
    “…Authors address an in-between posture and transitional phenomenon as key elements to offer secured learning situations and contexts. Inclusiveness at stake summons scaffholded frameworks to support learning processes for students and their teachers.…”
    Get full text
    Article
  8. 8728

    Biharmonic eigen-value problems and Lp estimates by Chaitan P. Gupta, Ying C. Kwong

    Published 1990-01-01
    “…Biharmonic eigen-values arise in the study of static equilibrium of an elastic body which has been suitably secured at the boundary. This paper is concerned mainly with the existence of and Lp-estimates for the solutions of certain biharmonic boundary value problems which are related to the first eigen-values of the associated biharmonic operators. …”
    Get full text
    Article
  9. 8729

    Arthroscopic Repair of the Anterior Inferior Tibiofibular Ligament by Mette Renate Andersen, M.D., Ph.D., Lise Benedikte Wendt Ræder, M.D., Ph.D., Are Haukåen Stødle, M.D., Ph.D.

    Published 2025-01-01
    “…Open reduction and repair of the anterior part of the syndesmosis is a proposed method to secure anatomic syndesmotic reduction in addition to improving the rotational stability of the ankle mortise. …”
    Get full text
    Article
  10. 8730

    ANALYSING EFFICIENCY OF AGGRESSIVE ETF-COMPOSED PORTFOLIO STRATEGIES by A. Zaviyalov

    Published 2014-06-01
    “…Based on the results of the t-tests, one can conclude whether the above-mentioned market segment is inefficient or partially inefficient, which would mean one can find an "aggressive"strategy to secure stable above-market returns.…”
    Get full text
    Article
  11. 8731

    SYSTEMATIC RISK ASSESMENT USING OLS METHOD - THE CASE OF THE CAPITAL MARKET OF BOSNIA AND HERZEGOVINA by Azra Zaimović

    Published 2012-05-01
    “…This capital market is new and underdeveloped, with a modest supply of securities and with a small number of marketable securities. …”
    Get full text
    Article
  12. 8732

    Identification and Prioritization of Solutions for Restoring Investors' Confidence in the Capital Market of the Islamic Republic of Iran by Yaser Sharifi, Mohammad Tohidi, Meisam Hamedi

    Published 2024-09-01
    “…According to the experts’ opinions, the most crucial solutions included preventing government intervention and non-expert comments by government officials in the capital market, reforming the economic system to enhance economic stability, increasing transparency in information and decision-making processes, and improving the performance of the Securities and Exchange Organization of Iran in detecting and addressing violations.…”
    Get full text
    Article
  13. 8733

    PERFORMANCES OF INSURANCE MARKET IN MONTENEGRO IN CONDITIONS OF FINANCIAL CRISIS by Miljana Novićević, Vladimir Kašćelan, Julija Cerović

    Published 2011-05-01
    “…Since the financial markets both in Montenegro and in the region are not sufficiently developed, the insurance companies were not able to invest funds in sophisticated securities and financial derivatives, while the Law on Insurance, on the other hand, limited the companies to invest available monetary assets in risky securities, such as stocks. …”
    Get full text
    Article
  14. 8734

    UKRAINE’S ENERGY POLICY IN THE POST-SOVIET ERA by Y. V. Borovsky

    Published 2016-08-01
    “…In the post-Soviet era the Ukrainian authorities, irrespective of their political affiliations, have tried to diversify the Russian oil and gas supplies either by securing deliveries from other sources or by enhancing production within the country. …”
    Get full text
    Article
  15. 8735

    The Effect of the Russian Subnational Debt on the Socio-economic Development of the Region by O. I. Larina, N. V. Moryzhenkova

    Published 2017-12-01
    “…Used methods of system analysis, comparison and clustering.The result is proved in the article that on the one hand the issue of securities does not stimulate socio-economic development of the region, on the other hand in the current situation, the desired reduction provide budget loans should pay attention of regions in the possible form of borrowing. …”
    Get full text
    Article
  16. 8736

    SYSTEMATIC RISK ASSESMENT USING OLS METHOD - THE CASE OF THE CAPITAL MARKET OF BOSNIA AND HERZEGOVINA by Azra Zaimović

    Published 2012-05-01
    “…This capital market is new and underdeveloped, with a modest supply of securities and with a small number of marketable securities. …”
    Get full text
    Article
  17. 8737

    An Analysis of Indonesia’s Free and Active COVID-19 Vaccine Diplomacy by Raden Mas Try Ananto Djoko Wicaksono, Fajar Bambang Hirawan, Safendrri Komara Ragamustari

    Published 2022-04-01
    “…Amid a global rush for vaccines, Indonesia has had to compete with other countries to secure vaccines to protect its people from the infection of COVID-19. …”
    Get full text
    Article
  18. 8738
  19. 8739

    Co-producing a safe mobility and falls informatics platform to drive meaningful quality improvement in the hospital setting: a mixed-methods protocol for the insightFall study by Ben Glampson, Clare Leon-Villapalos, Erik Mayer, Rachael Lear, Phoebe Averill, Catalina Carenzo, Rachel Tao, Robert Latchford

    Published 2025-02-01
    “…The data to be included in the informatics platform will be curated from electronic health records and incident reports within an existing secure data environment, with appropriate data access approvals and controls. …”
    Get full text
    Article
  20. 8740

    Big data exchange based on information chain by Nan LIU, Jinwu WEI, Lu LIU

    Published 2016-10-01
    “…Based on the block chain technology, a new decentralized data exchange platform was designed, which would secure the legal rights of data providers and realize the goal of safe circulation between the only mutual parties of the data exchange, strengthen the regulation and monitoring of flows data.…”
    Get full text
    Article