Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8721
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01“…Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance.…”
Get full text
Article -
8722
Novel mobile agent dynamic data integrity protection protocol
Published 2007-01-01“…Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.…”
Get full text
Article -
8723
Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia
Published 2009-06-01“…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
Get full text
Article -
8724
New affiliation-hiding authenticated key exchange protocol
Published 2015-09-01“…A new affiliation-hiding authenticated key agreement protocol was proposed.The proposal enables two anonymous users to accomplish a successful secret authentication and key agreement when their groups set intersection is non-empty and the cardinality of the set intersection should not be less than a threshold value.Meanwhile,the affiliations of groups outside of the set intersection remain confidential.The proposal is provably secure under the random oracle model,and the performance of the scheme is still competitive.…”
Get full text
Article -
8725
Impending Carotid Blowout Stabilization Using an LT-D Tube
Published 2014-01-01“…Reducing the bleeding and securing the airway are essential before more definitive management. …”
Get full text
Article -
8726
Identity-based incremental signature scheme from lattices
Published 2021-01-01“…By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against adaptive chosen identity and chosen message attacks in the standard model, assuming the hardness of the small integer solution problem.Theoretical analysis and experimental results show that the computational overhead of the incremental signature algorithm is less than that of the standard signature algorithm.…”
Get full text
Article -
8727
Approche clinique et didactique de l’inclusion des élèves porteurs de troubles du comportement
Published 2022-09-01“…Authors address an in-between posture and transitional phenomenon as key elements to offer secured learning situations and contexts. Inclusiveness at stake summons scaffholded frameworks to support learning processes for students and their teachers.…”
Get full text
Article -
8728
Biharmonic eigen-value problems and Lp estimates
Published 1990-01-01“…Biharmonic eigen-values arise in the study of static equilibrium of an elastic body which has been suitably secured at the boundary. This paper is concerned mainly with the existence of and Lp-estimates for the solutions of certain biharmonic boundary value problems which are related to the first eigen-values of the associated biharmonic operators. …”
Get full text
Article -
8729
Arthroscopic Repair of the Anterior Inferior Tibiofibular Ligament
Published 2025-01-01“…Open reduction and repair of the anterior part of the syndesmosis is a proposed method to secure anatomic syndesmotic reduction in addition to improving the rotational stability of the ankle mortise. …”
Get full text
Article -
8730
ANALYSING EFFICIENCY OF AGGRESSIVE ETF-COMPOSED PORTFOLIO STRATEGIES
Published 2014-06-01“…Based on the results of the t-tests, one can conclude whether the above-mentioned market segment is inefficient or partially inefficient, which would mean one can find an "aggressive"strategy to secure stable above-market returns.…”
Get full text
Article -
8731
SYSTEMATIC RISK ASSESMENT USING OLS METHOD - THE CASE OF THE CAPITAL MARKET OF BOSNIA AND HERZEGOVINA
Published 2012-05-01“…This capital market is new and underdeveloped, with a modest supply of securities and with a small number of marketable securities. …”
Get full text
Article -
8732
Identification and Prioritization of Solutions for Restoring Investors' Confidence in the Capital Market of the Islamic Republic of Iran
Published 2024-09-01“…According to the experts’ opinions, the most crucial solutions included preventing government intervention and non-expert comments by government officials in the capital market, reforming the economic system to enhance economic stability, increasing transparency in information and decision-making processes, and improving the performance of the Securities and Exchange Organization of Iran in detecting and addressing violations.…”
Get full text
Article -
8733
PERFORMANCES OF INSURANCE MARKET IN MONTENEGRO IN CONDITIONS OF FINANCIAL CRISIS
Published 2011-05-01“…Since the financial markets both in Montenegro and in the region are not sufficiently developed, the insurance companies were not able to invest funds in sophisticated securities and financial derivatives, while the Law on Insurance, on the other hand, limited the companies to invest available monetary assets in risky securities, such as stocks. …”
Get full text
Article -
8734
UKRAINE’S ENERGY POLICY IN THE POST-SOVIET ERA
Published 2016-08-01“…In the post-Soviet era the Ukrainian authorities, irrespective of their political affiliations, have tried to diversify the Russian oil and gas supplies either by securing deliveries from other sources or by enhancing production within the country. …”
Get full text
Article -
8735
The Effect of the Russian Subnational Debt on the Socio-economic Development of the Region
Published 2017-12-01“…Used methods of system analysis, comparison and clustering.The result is proved in the article that on the one hand the issue of securities does not stimulate socio-economic development of the region, on the other hand in the current situation, the desired reduction provide budget loans should pay attention of regions in the possible form of borrowing. …”
Get full text
Article -
8736
SYSTEMATIC RISK ASSESMENT USING OLS METHOD - THE CASE OF THE CAPITAL MARKET OF BOSNIA AND HERZEGOVINA
Published 2012-05-01“…This capital market is new and underdeveloped, with a modest supply of securities and with a small number of marketable securities. …”
Get full text
Article -
8737
An Analysis of Indonesia’s Free and Active COVID-19 Vaccine Diplomacy
Published 2022-04-01“…Amid a global rush for vaccines, Indonesia has had to compete with other countries to secure vaccines to protect its people from the infection of COVID-19. …”
Get full text
Article -
8738
Integrating Two-Tier Optimization Algorithm With Convolutional Bi-LSTM Model for Robust Anomaly Detection in Autonomous Vehicles
Published 2025-01-01“…The AV is an advanced automobile efficient in preserving secure driving by evading collisions formed by drivers. …”
Get full text
Article -
8739
Co-producing a safe mobility and falls informatics platform to drive meaningful quality improvement in the hospital setting: a mixed-methods protocol for the insightFall study
Published 2025-02-01“…The data to be included in the informatics platform will be curated from electronic health records and incident reports within an existing secure data environment, with appropriate data access approvals and controls. …”
Get full text
Article -
8740
Big data exchange based on information chain
Published 2016-10-01“…Based on the block chain technology, a new decentralized data exchange platform was designed, which would secure the legal rights of data providers and realize the goal of safe circulation between the only mutual parties of the data exchange, strengthen the regulation and monitoring of flows data.…”
Get full text
Article