Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8761
Research on reliability of pulsed electrothermal propulsion system of nanosatellite
Published 2021-12-01“…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
Get full text
Article -
8762
ID-based threshold decryption with non-reconstruction of the private key
Published 2009-01-01“…An efficient ID-based encryption scheme called EPA was constructed and proved in the sense of plaintext awareness.Then EPA was modified to be a threshold ID-based threshold decryption scheme named ThEPA, which was featured by a property called non-reconstruction of the private key with it, a robust key escrow scheme based on ThEPA was proposed.In ThEPA, the decryption key is distributed among n decryption servers, but a single private key could not be obtained even if securities of all these distributed servers are compromised.…”
Get full text
Article -
8763
Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application
Published 2012-01-01“…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
Get full text
Article -
8764
Relying on the Information
Published 2013-11-01“…The editorial discusses internet filtering in the light of the optional internet packages for users, namely Family, Standard, Kids and Domestic, to be offered by the Information Technologies Board with the "Secure Internet Law" to take effect on August 22, 2011. …”
Get full text
Article -
8765
Botanický ústav Německé univerzity v Praze a jeho výukové tabule
Published 2025-01-01“…In other words, they had to be familiar with the contemporary bureaucratic machinery and deal with it in a way that secured the maximum of what was possible for their institute. …”
Get full text
Article -
8766
Study on Chaotic Fault Tolerant Synchronization Control Based on Adaptive Observer
Published 2014-01-01“…Finally, the proposed synchronization schemes are applied to secure communication system successfully. The experimental results demonstrate that the employed observer can manage real-time fault diagnosis and parameter identification as well as states tracing of the master system, and so the synchronization of master system and slave system is achieved.…”
Get full text
Article -
8767
Dynamic spectrum sharing access technology based on blockchain
Published 2020-06-01“…The blockchain technology written in the smart contract has advantages of the enabling intelligent settlement,value transfer and resource sharing,which provides a new secure and trusted platform for the dynamic spectrum sharing system.Firstly,the application of blockchain technology in dynamic spectrum sharing was summarized,considering the requirements of spectrum sharing.The key problems that need to be solved when applying blockchain to the large-scale spectrum sharing system were discussed.After that,the key challenges were analyzed in depth,and corresponding key technologies and possible solutions were provided to the above problems.…”
Get full text
Article -
8768
Improved certificateless sequential multi-signature scheme
Published 2015-10-01“…A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown that the scheme had a drawback in the verifying algorithm,and then it overcame the drawback.But,the efficiency of the corrected scheme was greatly reduced.An efficient certificateless sequential multi-signature scheme is constructed,and the multi-signature generated by proposed scheme consists of one group element and the verification algorithm requires only 2 bilinear pairings.…”
Get full text
Article -
8769
Generalization and improvement of Nyberg-Rueppel message recovery blind signatures
Published 2005-01-01“…A generalized Nyberg-Rueppel message recovery blind signature scheme was presented,from which the scheme proposed by Camenisch et al and two new schemes could be obtained.One of these two new schemes was an efficiently improved scheme without computing any inverse while Camenisch et al’s scheme needs.Moreover,using the padding technique and hash function,a provably secure message recovery blind signature scheme,against adaptive chosen-message attack in random oracle model and generic group model,was proposed.…”
Get full text
Article -
8770
GENERATION OF DECELERATION PULSES OF THE TROLLEY IN CHILD RESTRAINT SYSTEMS’ DYNAMIC TESTS BASED ON SIMULATIONS AND EXPERIMENTAL VALIDATIONS
Published 2021-10-01“… As one of devices for passive safety, child restraint system remains a positive factor in securing the safety of child occupants in vehicles’ collisions. …”
Get full text
Article -
8771
MILESTONES OF PERSONNEL MANAGEMENT SCIENCE IN RUSSIA
Published 2016-02-01“…Finally, there is modern HR service function list presented. Such a list secure successful enterprises functioning for today.…”
Get full text
Article -
8772
Belize’s 2016–17 Sovereign Debt Restructuring – Third Time Lucky?
Published 2020-12-01“…While providing liquidity relief and partially addressing long-term debt sustainability concerns, the restructuring will need to be underpinned by ambitious fiscal consolidation and growth-enhancing structural reforms to secure durable gains and avoid future debt distress situations.…”
Get full text
Article -
8773
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01“…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
Get full text
Article -
8774
Les limites de la culture de guerre dans l’Italie fasciste durant la Seconde Guerre mondiale
Published 2011-05-01“…It was seen as the ultimate ordeal through which the «new man», imagined by the regime, had to go through in order to secure a glorious future for the fascist revolution. …”
Get full text
Article -
8775
Keeping a Household Inventory and Protecting Valuable Records
Published 2003-07-01“…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
Get full text
Article -
8776
ACTUAL PROBLEMS OF PERSONNEL POLICY AT THE ENTERPRISES OF PASSENGER MOTOR TRANSPORT
Published 2016-06-01“…The role of the labor potential in securing and improving the competitiveness of the passenger motor transportation enterprises. …”
Get full text
Article -
8777
FARMERS AND HERDERS CONFLICT: THE CASE OF OMALA LOCAL GOVERNMENT AREA
Published 2023-08-01“…The study recommended among other things that the crisis would be averted if the government can secure appropriate ranches for the herders to graze their cattle. …”
Get full text
Article -
8778
Keeping a Household Inventory and Protecting Valuable Records
Published 2003-07-01“…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
Get full text
Article -
8779
The Relationship Between Attachment Styles and Difficulty in Emotion Regulation: Investigating the Moderating Role of Reflective Functioning
Published 2024-11-01“…These participants completed the Reflective Functioning Questionnaires (RFQ), the Attachment Styles questionnaire (Hazen and Shaver, 1987), and the Difficulty in Emotion Regulation Scale (Gratz, 2004).Results: Hierarchical regression analysis indicated that individuals with a stronger secure attachment style exhibit greater confidence, which in turn facilitates easier emotion regulation. …”
Get full text
Article -
8780