Showing 8,861 - 8,880 results of 9,720 for search '"security"', query time: 0.05s Refine Results
  1. 8861

    How to Protect Future Generations' Rights in European Governance by Maja Göpel, Malte Arhelger

    Published 2010-10-01
    “…Given that future generations are right-bearing citizens of tomorrow, legislative systems should secure these rights through appropriate institutions. …”
    Get full text
    Article
  2. 8862

    Cluster-based key management scheme for ad hoc networks by HU Rong-lei1 2, LIU Jian-wei2, ZHANG Qi-shan2

    Published 2008-01-01
    “…A new threshold key distribution scheme basing on self-certified public key and CPK(composite public key) technology was presented for ad hoc networks.Basing on the key distribution scheme and cluster networks structure,an integrated key management scheme was presented.The public key can be certified itself and so the certificate is not need in the scheme.The process of key distribution is simple and the key escrow problem existing in IBE(identity-based en-cryption) scheme is solved.The scheme can be used in different scale networks and can meet the dynamic topology of the ad hoc networks.The experimental results and theoretical analysis show that the overhead of computation and communi-cation is lower.Comparing with PKI and IBE scheme the scheme is more secure and practical.…”
    Get full text
    Article
  3. 8863

    Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer by T. Youssef, M. Chadli, H. R. Karimi, M. Zelmat

    Published 2013-01-01
    “…This paper presents an unknown input Proportional Multiple-Integral Observer (PIO) for synchronization of chaotic systems based on Takagi-Sugeno (TS) fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. …”
    Get full text
    Article
  4. 8864

    Repair of traumatic flank hernia with mesh strip suture: a case report by Shin Ae Lee, Ye Rim Chang

    Published 2022-08-01
    “…Our findings indicate that when it is difficult to secure a sufficient operative field for mesh anchoring in a traumatic flank hernia, a technique of sutured repair with mesh strips may be considered as a treatment option as it requires less dissection. …”
    Get full text
    Article
  5. 8865

    Direct radiocarbon dating and stable isotopes of the neandertal femur from Les Rochers-de-Villeneuve (Lussac-les-Châteaux, Vienne) by Cédric Beauval, François Lacrampe-Cuyaubère, Bruno Maureille, Erik Trinkaus

    Published 2006-06-01
    “…The direct radiocarbon date makes it the oldest directly dated European Neandertal specimen, even though others have securely associated radiocarbon dates in the same time range. …”
    Get full text
    Article
  6. 8866

    Dandiacal Conversation in Oscar Wilde’s Comedies of Manners: Conventions, Conversions and Reconfigurations of Phallogocentrism by Gilbert Pham-Thanh

    Published 2010-12-01
    “…Their strong reliance on rhetoric ensures their supremacy in polite conversation, even if their intellectual and cultural edge does a lot to secure their domination. What is more, their mastery of codes and norms enables them to destabilize the semantics of the age, a gesture which can be equated to a reconfiguration of Victorian patriarchy and even a dismissal of Victorian grand narratives.…”
    Get full text
    Article
  7. 8867

    Energy Conservation, Singular Orbits, and FPGA Implementation of Two New Hamiltonian Chaotic Systems by Enzeng Dong, Guanghan Liu, Zenghui Wang, Zengqiang Chen

    Published 2020-01-01
    “…Since the conservative chaotic system (CCS) has no general attractors, conservative chaotic flows are more suitable for the chaos-based secure communication than the chaotic attractors. …”
    Get full text
    Article
  8. 8868

    Novel and effective secret sharing scheme by Run-hua SHI, Liu-sheng HUANG, Wei YANG, Hong ZHONG

    Published 2012-01-01
    “…A novel secret sharing scheme was proposed.This scheme consisted of two layer protocols:in the first layer,a larger secret was split into t smaller integers (sub-secrets) based on the Stern-Brocot tree; in the lower layer,t sub-secrets obtained from the first layer were regarded as t initial states in one-dimensional cellular automaton model,and then from the t initial states it could dynamic create all participants’ shares according to the simple fixed rule.This scheme could dynamic add new member,adjust the threshold value and renew the secret and the shares.Besides,there were still other advantages that the costs of the computation were very low and the size of the shares was very small.The results of analysis show that it was secure and very efficient.…”
    Get full text
    Article
  9. 8869

    Internal agricultural policy of the government of A. V. Kolchak by E. A. Koshechkina

    Published 2020-10-01
    “…This circumstance eventually secured the victory of Bolshevism…”
    Get full text
    Article
  10. 8870

    AI-Powered Decision Support Systems for Sustainable Agriculture using AI-Chatbot Solution by Emmanuel Asolo, Ifechukwu Gil-Ozoudeh, Chibundom Ejimuda

    Published 2024-06-01
    “…This study intends to link AI technology with farming, to make our future world more sustainable and food secure. …”
    Get full text
    Article
  11. 8871

    La lutte contre la piraterie au large de la Somalie by Vice-amiral Gérard Valin

    Published 2024-03-01
    “…At the end of the day, only a global approach of the Somalian issues will be able to secure the Gulf of Aden, which is a strategic Sea Line Of Communication for the world trade. …”
    Get full text
    Article
  12. 8872

    Československá vojenská mise v Kanadě: Činnost a výsledky by Tomáš Jiránek

    Published 2012-01-01
    “… The Czechoslovak military mission in Canada (1941–1943) aimed to secure the enlistment of local Czechs to Czechoslovak units in Great Britain. …”
    Get full text
    Article
  13. 8873

    Innovation et système des brevets aux États-Unis : un modèle en question(s) by Martine Azuelos

    Published 2006-01-01
    “…In an effort to promote economic growth by stimulating innovation, the Founding Fathers engraved the concept of patent in the Constitution of the United States by granting Congress the power “to promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.” …”
    Get full text
    Article
  14. 8874

    PRECONDITIONS OF LAND RELATIONS DEVELOPMENT: ECONOMIC, LEGAL AND INSTITUTIONAL

    Published 2018-12-01
    “…The article also proposes mortgage refinancing mechanism through the issue of mortgage land securities. …”
    Get full text
    Article
  15. 8875

    Small Arms and Light Weapons Proliferation and Gun Violence in West Africa Sub-Region by Agbegbedia Oghenevwoke Anthony

    Published 2022-11-01
    “…The government of the countries in the West African sub region should collaborate to beef securities in their borders. …”
    Get full text
    Article
  16. 8876

    Fibrodysplasia Ossificans Progressiva and Pregnancy: A Case Series and Review of the Literature by Alexandra D. Forrest, Danielle M. Vuncannon, Jane E. Ellis, Zvi Grunwald, Frederick S. Kaplan

    Published 2022-01-01
    “…These cases posed unique anesthetic and obstetric technical challenges, particularly when securing the airway and performing cesarean delivery. …”
    Get full text
    Article
  17. 8877

    A Mislocated Intrauterine Device Migrating to the Urinary Bladder: An Uncommon Complication Leading to Stone Formation by Mohamed Ali Nouioui, Tarek Taktak, Seif Mokadem, Houssem Mediouni, Ramzi Khiari, Samir Ghozzi

    Published 2020-01-01
    “…We report a case of an IUD migrating from its normal position in the uterine cavity into the urinary bladder causing chronic low urinary tract symptoms in a 43-year-old female patient. The device was securely removed without complications using grasping forceps under cystoscopy, and no parietal defect was detected. …”
    Get full text
    Article
  18. 8878

    A digital audio data protection method using parametric action of generalised triangle group on GF(28) by Aqsa Zafar Abbasi, Ayesha Rafiq, Badr M. Alshammari

    Published 2025-01-01
    “…Also, based on the resulting parametric equations, the authors have presented an audio encryption approach in this study. The extremely secure S-Box, which is then utilised to encrypt audio signals, is built using parametric equations. …”
    Get full text
    Article
  19. 8879
  20. 8880

    Homomorphic signature schemes for single-source and multi-source network coding by Huifang YU, Wen LI

    Published 2019-11-01
    “…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
    Get full text
    Article