Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
861
Verifiable three-party secure key exchange protocol based on eigenvalue
Published 2019-12-01“…In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However,the validity of key exchange cannot be verified by the scheme,and counterfeiting by middlemen can’t be prevented.Then based on it,the secret matrix was reconstructed,where the matrix order was a large even number,and all the eigenvalues appeared in pairs,similar to the diagonal matrix.Based on the special secret matrix,the verification part which can be used to verify the legitimacy of the communication party was introduced to the scheme,and the verifiable three-party key exchange protocol based on the eigenvalue was given.The protocol not only solved the problem of three-party key exchange,but also verified identity legitimacy.It is proved that it’s feasible to design a three-party key exchange protocol by the eigenvalue.The final protocol is both secure and efficient.…”
Get full text
Article -
862
Performance Analysis of Artificial-Noise-Based Secure Transmission in Wiretap Channel
Published 2024-12-01Subjects: Get full text
Article -
863
Ontology model based on security parameters capturing process for network systems
Published 2017-02-01Subjects: “…security evaluation…”
Get full text
Article -
864
Firearms control as an element of criminological security in the concept of transitional justice for Ukraine
Published 2024-06-01Subjects: Get full text
Article -
865
Factors influencing food security among fishermen households in West Java
Published 2025-01-01“…Background: Food security is a critical component of sustainable development, particularly concerning health and nutrition. …”
Get full text
Article -
866
Novel construction of forward-secure public-key encryption in the standard model
Published 2014-02-01Subjects: Get full text
Article -
867
Public security in the pre-classical political and legal thought of ancient Greece
Published 2022-03-01Subjects: “…public security…”
Get full text
Article -
868
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01Subjects: Get full text
Article -
869
“REDISCOVERY” OF KNOWLEDGE ABOUT THE FUTURE: PERSPECTIVES OF RUSSIA’S SECURITY UP TO 2050
Published 2017-11-01Subjects: Get full text
Article -
870
Multidimensional Determinants of National Food Security in Azerbaijan: an Application of the ARDL Approach
Published 2019-12-01“…The attainment of food security is crucial and is a prime development priority for all developing countries. …”
Get full text
Article -
871
Knowledge graph based ubiquitous power IoT security visualization technology
Published 2019-11-01Subjects: Get full text
Article -
872
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.…”
Get full text
Article -
873
AN ASSESSMENT OF CIVIL-MILITARY RELATIONS AND ITS IMPLICATIONS ON NIGERIA'S NATIONAL SECURITY
Published 2022-05-01“…This has continued to contribute to the present level of national insecurity in Nigeria, further exposing and affecting the security architecture of the Nigerian state. …”
Get full text
Article -
874
QR code security management system based on WPKI and iris recognition
Published 2018-05-01“…Aiming at the deficiency of existing QR code security technology,a security management system based on WPKI and iris recognition was designed and implemented.The system uses digital certificates to sign the hashed information for the user to verify the source of the QR code based on WPKI technology.Through the public security household registration management system,WPKI/CA system,server and mobile client four subsystems to standardize the management of the production and identification of QR code,and the application for the certificate of the user real name certification combined with biometric identification technology,indirectly realizing the binding of digital certificates and user physical identities to form a set of accountability mechanisms.Test results show that the system can meet accuracy and robustness requirements.…”
Get full text
Article -
875
Enhancing IoT security in smart grids with quantum-resistant hybrid encryption
Published 2025-01-01“…However, this integration also introduces significant security challenges, particularly data encryption. …”
Get full text
Article -
876
Prospect of secure-efficient search and privacy-preserving mechanism on big data
Published 2016-04-01Subjects: Get full text
Article -
877
Motorcycle Parking Security System based on Website and QR Code Technology
Published 2023-09-01Subjects: “…Motorcycle; Security; Microcontroller ESP32; Website; Motor servo…”
Get full text
Article -
878
Social diagnostics of information security of digital society: methodological and regulatory aspects
Published 2020-02-01Subjects: Get full text
Article -
879
Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection
Published 2025-01-01“…Thus, it is indispensable to configure a security system that accurately detects attacks on each user’s system. …”
Get full text
Article -
880
Method for Information Security Events Detection in a Cloud Signature Systems
Published 2024-06-01Subjects: Get full text
Article