Showing 8,761 - 8,780 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 8761

    Research on reliability of pulsed electrothermal propulsion system of nanosatellite by V. N. Blinov, V. V. Kositsin, A. I. Lukyanchik, P. V. Stepen, P. S. Yachmenev

    Published 2021-12-01
    “…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
    Get full text
    Article
  2. 8762

    ID-based threshold decryption with non-reconstruction of the private key by QIN Bao-shan 1, ZHOU Yuan2

    Published 2009-01-01
    “…An efficient ID-based encryption scheme called EPA was constructed and proved in the sense of plaintext awareness.Then EPA was modified to be a threshold ID-based threshold decryption scheme named ThEPA, which was featured by a property called non-reconstruction of the private key with it, a robust key escrow scheme based on ThEPA was proposed.In ThEPA, the decryption key is distributed among n decryption servers, but a single private key could not be obtained even if securities of all these distributed servers are compromised.…”
    Get full text
    Article
  3. 8763

    Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application by Wen Tan, Feng Ling Jiang, Chuang Xia Huang, Lan Zhou

    Published 2012-01-01
    “…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
    Get full text
    Article
  4. 8764

    Relying on the Information by TK YAYIN KURULU

    Published 2013-11-01
    “…The editorial discusses internet filtering in the light of the optional internet packages for users, namely Family, Standard, Kids and Domestic, to be offered by the Information Technologies Board with the "Secure Internet Law" to take effect on August 22, 2011. …”
    Get full text
    Article
  5. 8765

    Botanický ústav Německé univerzity v Praze a jeho výukové tabule by Jana Ratajová

    Published 2025-01-01
    “…In other words, they had to be familiar with the contemporary bureaucratic machinery and deal with it in a way that secured the maximum of what was possible for their institute. …”
    Get full text
    Article
  6. 8766

    Study on Chaotic Fault Tolerant Synchronization Control Based on Adaptive Observer by Dongming Chen, Xinyu Huang, Tao Ren

    Published 2014-01-01
    “…Finally, the proposed synchronization schemes are applied to secure communication system successfully. The experimental results demonstrate that the employed observer can manage real-time fault diagnosis and parameter identification as well as states tracing of the master system, and so the synchronization of master system and slave system is achieved.…”
    Get full text
    Article
  7. 8767

    Dynamic spectrum sharing access technology based on blockchain by Wei WANG, Zuguang LI, Qihui WU

    Published 2020-06-01
    “…The blockchain technology written in the smart contract has advantages of the enabling intelligent settlement,value transfer and resource sharing,which provides a new secure and trusted platform for the dynamic spectrum sharing system.Firstly,the application of blockchain technology in dynamic spectrum sharing was summarized,considering the requirements of spectrum sharing.The key problems that need to be solved when applying blockchain to the large-scale spectrum sharing system were discussed.After that,the key challenges were analyzed in depth,and corresponding key technologies and possible solutions were provided to the above problems.…”
    Get full text
    Article
  8. 8768

    Improved certificateless sequential multi-signature scheme by Hong-zhen DU, Qiao-yan WEN

    Published 2015-10-01
    “…A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown that the scheme had a drawback in the verifying algorithm,and then it overcame the drawback.But,the efficiency of the corrected scheme was greatly reduced.An efficient certificateless sequential multi-signature scheme is constructed,and the multi-signature generated by proposed scheme consists of one group element and the verification algorithm requires only 2 bilinear pairings.…”
    Get full text
    Article
  9. 8769

    Generalization and improvement of Nyberg-Rueppel message recovery blind signatures by HUANG Zhen-jie1, WANG Yu-min2, CHEN Ke-fei1

    Published 2005-01-01
    “…A generalized Nyberg-Rueppel message recovery blind signature scheme was presented,from which the scheme proposed by Camenisch et al and two new schemes could be obtained.One of these two new schemes was an efficiently improved scheme without computing any inverse while Camenisch et al’s scheme needs.Moreover,using the padding technique and hash function,a provably secure message recovery blind signature scheme,against adaptive chosen-message attack in random oracle model and generic group model,was proposed.…”
    Get full text
    Article
  10. 8770

    GENERATION OF DECELERATION PULSES OF THE TROLLEY IN CHILD RESTRAINT SYSTEMS’ DYNAMIC TESTS BASED ON SIMULATIONS AND EXPERIMENTAL VALIDATIONS by ZHE WEI

    Published 2021-10-01
    “… As one of devices for passive safety, child restraint system remains a positive factor in securing the safety of child occupants in vehicles’ collisions. …”
    Get full text
    Article
  11. 8771

    MILESTONES OF PERSONNEL MANAGEMENT SCIENCE IN RUSSIA by Y. Proshina

    Published 2016-02-01
    “…Finally, there is modern HR service function list presented. Such a list secure successful enterprises functioning for today.…”
    Get full text
    Article
  12. 8772

    Belize’s 2016–17 Sovereign Debt Restructuring – Third Time Lucky? by Tamon Asonuma, Michael G. Papaioannou, Eriko Togo, Bert van Selm

    Published 2020-12-01
    “…While providing liquidity relief and partially addressing long-term debt sustainability concerns, the restructuring will need to be underpinned by ambitious fiscal consolidation and growth-enhancing structural reforms to secure durable gains and avoid future debt distress situations.…”
    Get full text
    Article
  13. 8773

    Verifiably private outsourcing scheme for multivariate polynomial evaluation by Yan-li REN, Da-wu GU, Jian-xing CAI, Chun-shui HUANG

    Published 2015-08-01
    “…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
    Get full text
    Article
  14. 8774

    Les limites de la culture de guerre dans l’Italie fasciste durant la Seconde Guerre mondiale by Philippe Foro

    Published 2011-05-01
    “…It was seen as the ultimate ordeal through which the «new man», imagined by the regime, had to go through in order to secure a glorious future for the fascist revolution. …”
    Get full text
    Article
  15. 8775

    Keeping a Household Inventory and Protecting Valuable Records by Regina Fegan, Michael T. Olexa

    Published 2003-07-01
    “…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
    Get full text
    Article
  16. 8776

    ACTUAL PROBLEMS OF PERSONNEL POLICY AT THE ENTERPRISES OF PASSENGER MOTOR TRANSPORT by Y. Proshina

    Published 2016-06-01
    “…The role of the labor potential in securing and improving the competitiveness of the passenger motor transportation enterprises. …”
    Get full text
    Article
  17. 8777

    FARMERS AND HERDERS CONFLICT: THE CASE OF OMALA LOCAL GOVERNMENT AREA by Fidelis Achoba, Mercy Ura Abraham

    Published 2023-08-01
    “…The study recommended among other things that the crisis would be averted if the government can secure appropriate ranches for the herders to graze their cattle. …”
    Get full text
    Article
  18. 8778

    Keeping a Household Inventory and Protecting Valuable Records by Regina Fegan, Michael T. Olexa

    Published 2003-07-01
    “…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
    Get full text
    Article
  19. 8779

    The Relationship Between Attachment Styles and Difficulty in Emotion Regulation: Investigating the Moderating Role of Reflective Functioning by Fatemeh Arab Alidoosti, Mahmoud Dehghani, Maryam Roshan, Somayeh Robat Milli

    Published 2024-11-01
    “…These participants completed the Reflective Functioning Questionnaires (RFQ), the Attachment Styles questionnaire (Hazen and Shaver, 1987), and the Difficulty in Emotion Regulation Scale (Gratz, 2004).Results: Hierarchical regression analysis indicated that individuals with a stronger secure attachment style exhibit greater confidence, which in turn facilitates easier emotion regulation. …”
    Get full text
    Article
  20. 8780