Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8841
RLWE-based ciphertext-policy attribute proxy re-encryption
Published 2018-11-01“…To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute encryption could shorten the key size,reduce the ciphertext space and improve the efficiency of encryption and decryption.At the same time,the linear secret sharing matrix was used as an access matrix to meet the requirements of authorized person fine-grained commissioning control and to resist the collusion between the agent and the authorized person.In addition,the proposed scheme is shown to be secure under the ring learning with errors assumption in the standard model.…”
Get full text
Article -
8842
Efficient attack detection and data aggregation algorithm
Published 2012-09-01“…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
Get full text
Article -
8843
Improved method of Tor network flow watermarks based on IPD interval
Published 2019-08-01“…Tor is an anonymous network mechanism that provides services for hiding traffic sources,but it has the problem that the entry traffic flows of Tor are clearly identifiable.Bridge protocols such as obfs4 come into being to solve this problem,which brings new challenges that have not yet been overcome.An IPD interval scheme is proposed,which uses the clustering characteristics of k-means to improve the original scheme,so that the added flow watermark can be detected efficiently in the three modes of obfs4 bridges.The results of experiments show that the improved algorithm has higher detection rate and recognition rate,and has good adaptability to variable netflow traffic,which is conducive to the construction of a nice secure network environment.…”
Get full text
Article -
8844
Long-Term Remission of a Spinal Atypical Teratoid Rhabdoid Tumor in Response to Intensive Multimodal Therapy
Published 2019-01-01“…Provided clinical and diagnostic suspicion is high, the histopathological diagnosis is relatively straightforward to secure by testing for the characteristic loss of the tumor suppressor protein SMARCB1/INI1. …”
Get full text
Article -
8845
Architecture and challenges of system models for marine data transmission networks
Published 2021-07-01“…Marine data transmission networks are different from terrestrials in the following aspects: high dynamics and uncertainties in network boundary, network path and communication and networking resources, heterogeneities of communication media and asymmetric communication performance, complexity of marine communication network resources with limited capabilities and ability, and high complexity and mobility of marine users with low distribution densities etc.In view of the above peculiarities for communication network in the marine space, an SM for marine data transmission network was studied from the aspects of business characteristics, network composition, network characteristics and architecture, and five challenges faced by the architecture were focused on, including adaptability, intelligent networking, transparent transmission, roaming support and secure transmission.…”
Get full text
Article -
8846
Précarité alimentaire et pratiques informationnelles des étudiant·e·s
Published 2023-10-01“…Four categories were identified: food secure, mildly food insecure, moderately food insecure and severely food insecure. …”
Get full text
Article -
8847
Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol
Published 2014-03-01“…We propose a method of software-based transmission protocol simulation for the establishment of ubiquitous infrastructure as a method of securing reliability of a ubiquitous sensor network (USN), which is an important element of ubiquitous infrastructure establishment. …”
Get full text
Article -
8848
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
8849
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
8850
Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles
Published 2022-04-01“…Aiming at the efficiency problem of privacy data sharing in the Internet of vehicles (IoV), an efficient distributed model sharing strategy based on blockchain was proposed.In response to the data sharing requirements among multiple entities and roles in the IoV, a master-slave chain architecture was built between vehicles, roadside units, and base stations to achieve secure sharing of distributed models.An asynchronous federated learning algorithm based on motivate mechanism was proposed to encourage vehicles and roadside units to participate in the optimization process.An improved DPoS consensus algorithm with hybrid PBFT was constructed to reduce communication costs and improve consensus efficiency.Experimental analysis shows that the proposed mechanism can improve the efficiency of data sharing and has certain scalability.…”
Get full text
Article -
8851
Attribute-based authenticated key agreement protocol supporting revocation
Published 2014-05-01“…The protocol is provably secure in the standard model and modified ABCK model. …”
Get full text
Article -
8852
Entre el indigenismo y las compañías bananeras internacionales:El origen de las reservas indígenas en Costa Rica, 1907-1956
Published 2019-01-01“…Nonetheless, in 1956 its government began securing indigenous land rights by erecting reserves. …”
Get full text
Article -
8853
Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network
Published 2016-07-01“…The theoretical analysis shows that this scheme is secure and effective, and thus it is especially suit-able for large-scale wireless mobile networks.…”
Get full text
Article -
8854
Application-aware IPv6 networking
Published 2020-08-01“…,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
Get full text
Article -
8855
Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms
Published 2015-01-01“…Watermarking plays an important role in protecting, sharing, and securing medical data. In this work, a robust nonblind medical image watermarking scheme is proposed. …”
Get full text
Article -
8856
Financial aspects of Public-Private Partnership
Published 2008-03-01“…The growth of public requests is evident in the case of Croatia, but also present in every European country, with the government’s lack of ability to secure sufficient financial income. The look for additional sources of financing, in order to build public infrastructure, is directed therefore more and more to the private financing capital and to public-private partnerships. …”
Get full text
Article -
8857
Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period
Published 2019-01-01“…Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.…”
Get full text
Article -
8858
Data processing based on the privacy-preserving vector for wireless sensor networks
Published 2015-09-01“…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
Get full text
Article -
8859
Du détroit de Malacca jusqu’à sa périphérie
Published 2009-09-01“…Although the Malacca Strait was previously one of the main piracy prone areas, it is becoming increasingly secure, and presents itself as a good example. Nevertheless, field research tends to cast a shadow over this optimistic view. …”
Get full text
Article -
8860
Decolonising Bibles? Image, imagination, and imagin(in)g in the postcolonial academy
Published 2023-11-01“…Ensconced in the image of ideologically secure and contented intellectual space, epistemological and hermeneutical approaches which explicitly involve the social location of interpreters and academic discourses are still viewed with concern if not suspicion. …”
Get full text
Article