Showing 8,841 - 8,860 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 8841

    RLWE-based ciphertext-policy attribute proxy re-encryption by En ZHANG, Yaoyao PEI, Jiao DU

    Published 2018-11-01
    “…To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute encryption could shorten the key size,reduce the ciphertext space and improve the efficiency of encryption and decryption.At the same time,the linear secret sharing matrix was used as an access matrix to meet the requirements of authorized person fine-grained commissioning control and to resist the collusion between the agent and the authorized person.In addition,the proposed scheme is shown to be secure under the ring learning with errors assumption in the standard model.…”
    Get full text
    Article
  2. 8842

    Efficient attack detection and data aggregation algorithm by Hong-bing CHENG, Chun-ming RONG, Xiao HUANG, Skjalg EGGEN, Qing-kai ZENG

    Published 2012-09-01
    “…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
    Get full text
    Article
  3. 8843

    Improved method of Tor network flow watermarks based on IPD interval by Jie DU, Yongzhong HE, Ye DU

    Published 2019-08-01
    “…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
    Get full text
    Article
  4. 8844

    Long-Term Remission of a Spinal Atypical Teratoid Rhabdoid Tumor in Response to Intensive Multimodal Therapy by Fahd Refai, Haneen Al-Maghrabi, Hassan Al Trabolsi, Jaudah Al-Maghrabi

    Published 2019-01-01
    “…Provided clinical and diagnostic suspicion is high, the histopathological diagnosis is relatively straightforward to secure by testing for the characteristic loss of the tumor suppressor protein SMARCB1/INI1. …”
    Get full text
    Article
  5. 8845

    Architecture and challenges of system models for marine data transmission networks by Shengming JIANG, Lige GE, Yanli XU

    Published 2021-07-01
    “…Marine data transmission networks are different from terrestrials in the following aspects: high dynamics and uncertainties in network boundary, network path and communication and networking resources, heterogeneities of communication media and asymmetric communication performance, complexity of marine communication network resources with limited capabilities and ability, and high complexity and mobility of marine users with low distribution densities etc.In view of the above peculiarities for communication network in the marine space, an SM for marine data transmission network was studied from the aspects of business characteristics, network composition, network characteristics and architecture, and five challenges faced by the architecture were focused on, including adaptability, intelligent networking, transparent transmission, roaming support and secure transmission.…”
    Get full text
    Article
  6. 8846

    Précarité alimentaire et pratiques informationnelles des étudiant·e·s by Céline Paganelli, Viviane Clavier

    Published 2023-10-01
    “…Four categories were identified: food secure, mildly food insecure, moderately food insecure and severely food insecure. …”
    Get full text
    Article
  7. 8847

    Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol by Chang-Su Kim, Jong-Il Park, Hoe-Kyung Jung

    Published 2014-03-01
    “…We propose a method of software-based transmission protocol simulation for the establishment of ubiquitous infrastructure as a method of securing reliability of a ubiquitous sensor network (USN), which is an important element of ubiquitous infrastructure establishment. …”
    Get full text
    Article
  8. 8848

    Trucking, Owner-Operators, and Florida Perishables by Richard Beilock

    Published 2005-04-01
    “…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
    Get full text
    Article
  9. 8849

    Trucking, Owner-Operators, and Florida Perishables by Richard Beilock

    Published 2005-04-01
    “…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
    Get full text
    Article
  10. 8850

    Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles by Zijia MO, Zhipeng GAO, Yang YANG, Yijing LIN, Shan SUN, Chen ZHAO

    Published 2022-04-01
    “…Aiming at the efficiency problem of privacy data sharing in the Internet of vehicles (IoV), an efficient distributed model sharing strategy based on blockchain was proposed.In response to the data sharing requirements among multiple entities and roles in the IoV, a master-slave chain architecture was built between vehicles, roadside units, and base stations to achieve secure sharing of distributed models.An asynchronous federated learning algorithm based on motivate mechanism was proposed to encourage vehicles and roadside units to participate in the optimization process.An improved DPoS consensus algorithm with hybrid PBFT was constructed to reduce communication costs and improve consensus efficiency.Experimental analysis shows that the proposed mechanism can improve the efficiency of data sharing and has certain scalability.…”
    Get full text
    Article
  11. 8851

    Attribute-based authenticated key agreement protocol supporting revocation by Qiang LI, Deng-guo FENG, Li-wu ZHANG

    Published 2014-05-01
    “…The protocol is provably secure in the standard model and modified ABCK model. …”
    Get full text
    Article
  12. 8852

    Entre el indigenismo y las compañías bananeras internacionales:El origen de las reservas indígenas en Costa Rica, 1907-1956 by Alejandra Boza Villarreal

    Published 2019-01-01
    “…Nonetheless, in 1956 its government began securing indigenous land rights by erecting reserves. …”
    Get full text
    Article
  13. 8853

    Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network by Dan LIU, Run-hua SHI, Shun ZHANG, Hong ZHONG

    Published 2016-07-01
    “…The theoretical analysis shows that this scheme is secure and effective, and thus it is especially suit-able for large-scale wireless mobile networks.…”
    Get full text
    Article
  14. 8854

    Application-aware IPv6 networking by Lin HE, Peng KUANG, Shicheng WANG, Ying LIU, Xing LI, Shuping PENG

    Published 2020-08-01
    “…,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
    Get full text
    Article
  15. 8855

    Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms by Pushpa Mala Siddaraju, Devappa Jayadevappa, Kaliyamoorthy Ezhilarasan

    Published 2015-01-01
    “…Watermarking plays an important role in protecting, sharing, and securing medical data. In this work, a robust nonblind medical image watermarking scheme is proposed. …”
    Get full text
    Article
  16. 8856

    Financial aspects of Public-Private Partnership by Livijo Sajko

    Published 2008-03-01
    “…The growth of public requests is evident in the case of Croatia, but also present in every European country, with the government’s lack of ability to secure sufficient financial income. The look for additional sources of  financing, in order to build public infrastructure, is directed therefore more and more to the private financing capital and to public-private partnerships. …”
    Get full text
    Article
  17. 8857

    Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period by Chuanfu Wang, Qun Ding

    Published 2019-01-01
    “…Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.…”
    Get full text
    Article
  18. 8858

    Data processing based on the privacy-preserving vector for wireless sensor networks by Wei-ni ZENG, Ya-ping LIN, Ye-qing YI, Shi-ming HE, Peng CHEN

    Published 2015-09-01
    “…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
    Get full text
    Article
  19. 8859

    Du détroit de Malacca jusqu’à sa périphérie by Eric Frécon

    Published 2009-09-01
    “…Although the Malacca Strait was previously one of the main piracy prone areas, it is becoming increasingly secure, and presents itself as a good example. Nevertheless, field research tends to cast a shadow over this optimistic view. …”
    Get full text
    Article
  20. 8860

    Decolonising Bibles? Image, imagination, and imagin(in)g in the postcolonial academy by J. Punt

    Published 2023-11-01
    “…Ensconced in the image of ideologically secure and contented intellectual space, epistemological and hermeneutical approaches which explicitly involve the social location of interpreters and academic discourses are still viewed with concern if not suspicion. …”
    Get full text
    Article