Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8961
SDN based e-mail repudiation source restraining method
Published 2016-09-01“…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
Get full text
Article -
8962
Multi-authority ABS supporting dendritic access structure
Published 2017-07-01“…Attribute-based signature (ABS),which could realize fine-grained access control,was considered to be an important method for anonymous authentication in cloud computing.However,normal ABS only provided simple access control through threshold structure and thus could not cope with the large-scale attribute sets of users in the cloud.Moreover,the attribute sets were supervised by only one attribute authority,which increased the cost of computation and storage.The whole system was in danger of collapsing once the attribute authority was breached.Aiming at tackling the problems above,a novel scheme,was proposed called multi-authority ABS supporting dendritic access structure which supported any AND,OR and threshold gates and affords more flexible access control.Meanwhile,the attribute sets of users were classified by diverse attribute authorities which reduced the overhead and the risk of systems.Besides,the scheme is proved to be selective predicate chosen message attack secure in the random oracle model.…”
Get full text
Article -
8963
Cugoano on Redressing Slavery: The Demands of Liberty
Published 2025-01-01“…Cugoano envisioned legal redress to necessitate that all Afro-diasporic laborers be enfranchised, securing the conditions for a free community. By examining his vision for liberation, the article reconstructs Cugoano’s idea of liberty as a social and common good. …”
Get full text
Article -
8964
HDFS-oriented cryptographic key resource control mechanism
Published 2022-09-01“…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
Get full text
Article -
8965
Millimeter-wave array enabled UAV-to-UAV communication technology
Published 2022-10-01“…As the application scope of unmanned aerial vehicle (UAV) expands and the tasks become more complicated, the demands for large bandwidth, high data rate and antijamming capability in UAV-to-UAV (V2V) communication grow rapidly.With abundant spectrum resource, millimeter-wave (mmWave) array communication has been one of the key technologies to support V2V communications.Focusing on the emerging field of mmWave array V2V communication, the difficulties and challenges in point-to-point communication and unmanned aerial vehicle ad-hoc network were analyzed.The problems and approaches for channel modeling, robust beamforming, secure communication in point-to-point communication and neighbor discovery, routing decisions, resource allocation, distributed deployment in unmanned aerial vehicle ad-hoc network were reviewed.Some valuable research directions were summarized to provide inspiration for future relevant research.…”
Get full text
Article -
8966
Comparative study of anonymous network Tor and I2P
Published 2019-02-01“…Tor is the most deployed anonymous communication system,providing online anonymity and privacy protection,while the invisible Internet project allows applications to send messages to each other anonymously and securely by using garlic routing.The anonymous network Tor and I2P have been highly valued by the academic community and the industry,and are also welcomed by users.The key difference between the design concept between the Tor network and the I2P is that I2P attempts to transfer the existing Internet service to the I2P network,and service implementation is provided within the framework,while Thor allows anonymous access to implement and operate external Internet services separately.The anonymous networks Tor and I2P in terms of terminology,project development,anonymous services,key technologies,threat types,etc.were compared,revealing the inherent and essential differences between the two anonymous networks.…”
Get full text
Article -
8967
Colonial and Postcolonial Logistics
Published 2018-11-01“…The analysis of infrastructure development in postcolonial Zambia illustrates the competing strategies through which imperialist powers attempted to secure a new form of control on Africa and elucidates the role of logistics as a decisive tool to shape the African territory.…”
Get full text
Article -
8968
Possible paths towards sustainable tourism development in a high-mountain resort
Published 2009-12-01“…The local approach of "sustainable tourism", indeed, seems for the moment rather to aim - as in many other high mountain ski resorts - towards a more environmental management of the basic urban functions than a real questioning of a tourist model based upon the triptych development of the ski slopes, securizing of the snow resource and touristic real estate programs.…”
Get full text
Article -
8969
Musulmans et non musulmans dans la Salonique ottomane (xviiie siècle).L’affrontement sur les espaces et les lignes de démarcation
Published 2005-09-01“…By using the evidence of the sicilt (the records of the şeriat court), I demonstrate the various legal strategies that were adopted by non-Muslims to secure their own interests in the public space: challenging existing boundaries or resisting any intrusion that might endanger their own position. …”
Get full text
Article -
8970
Practical group signature scheme with verifier-local revocation
Published 2011-01-01“…An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with verifier-local revocation;for example,some group signature schemes do not have exculpability and the computation cost of revocation check is dependent on the length of the revocation list,and so on.In order to solve above problems,and aim at the application of group signatures for enabling privacy-preserving attestation,a practical group signature scheme with verifier-local revocation based on the strong Diffie-Hellman assumption and decision linear Diffie-Hellman assumption,which was proven to be secure in the random Oracle model was proposed.The efficiency of the proposed scheme was analyzed.Compared with the existing verifier-local revocation group signatures,the computa-tion cost of revocation check in the scheme is independent of the length of the revocation list.At the same time,the scheme satisfies exculpability and backward unlinkability.…”
Get full text
Article -
8971
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…Different from previous anonymous secure routing protocols, this paper proposes an anonymous routing protocol, ARAKE, which not only makes the sender and the receiver anonymous but also hides the intermediate nodes from the network simultaneously. …”
Get full text
Article -
8972
Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos
Published 2016-01-01“…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
Get full text
Article -
8973
Omilayers: a Python package for efficient data management to support multi-omic analysis
Published 2025-02-01“…Conducting an effective analysis of these datasets necessitates a data management system that meets a specific set of requirements, such as rapid storage and retrieval of data with varying numbers of features and mixed data-types, ensurance of reliable and secure database transactions, extension of stored data row and column-wise and facilitation of data distribution. …”
Get full text
Article -
8974
Rating Agencies in Russia and their Influence on Subfederal Borrowing
Published 2017-12-01“…It is planned that later on the regions will develop market borrowings first of all in form of securities. This article analyzes the infrastructural component of the market of subfederal and municipal borrowings - rating agencies in Russia. …”
Get full text
Article -
8975
Privacy-preserving attribute-based encryption scheme on ideal lattices
Published 2018-03-01“…Based on the small key size and high encryption efficiency on ideal lattices,a privacy-preserving attribute-based encryption scheme on ideal lattices was proposed,which could support flexible access policies and privacy protection for the users.In the scheme,a semi-hidden policy was introduced to protect the users’ privacy.Thus,the sensitive values of user’s attributes are hidden to prevent from revealing to any third parties.In addition,the extended Shamir secret-sharing schemes was used to construct the access tree structure which can support “and” “or” and “threshold” operations of attributes with a high flexibility.Besides,the scheme was proved to be secure against chosen plaintext attack under the standard mode.Compared to the existing related schemes,the scheme can yield significant performance benefits,especially the size of system public/secret keys,users’ secret key and ciphertext.It is more effective in the large scale distributed environment.…”
Get full text
Article -
8976
Boredom, Cohesion, and Transformation in Nick Drnaso’s Beverly
Published 2022-12-01“…In turn, the possibility that the repetitive interactions of everyday life in fact provide known and secure structures, compensating for their flat sameness, is revealed to be hollow by most characters’ frustrations, melancholy, and lack of joyful connection with others. …”
Get full text
Article -
8977
Sinn Féin’s Tortuous Road to Power
Published 2014-12-01“…Sinn Féin, once an outcast of Northern Ireland political life, now sits in the power-sharing Executive alongside the Democratic Unionist Party. In order to secure such a position, it had to transform itself, abandoning deep-seated principles such as abstentionism and severe the link between political and military actions. …”
Get full text
Article -
8978
A Lissajous Curve–Based Method for Busbar Protection
Published 2024-01-01“…Moreover, the proposed scheme can detect evolving external to internal faults with CT saturation, internal faults during power transformer energization, and internal faults in the presence of white noise. Additionally, it is secure against external faults with current transformer (CT) saturation.…”
Get full text
Article -
8979
IRCICA Library UHF RFID Solutions
Published 2011-03-01“…IRCICA library has formed the UHF RFID system to find various materials in a reliable and expedient way, to do its counting in a consistent and rapid manner, as well as labeling and controlling various items, controlling and documenting the check-ins and check-outs from the library and setting up a secure and effective circulation of materials within the library. …”
Get full text
Article -
8980
Quality schemes and pastoralism in France
Published 2015-02-01“…Strengthening and securing economic activity in rural areas figure among the objectives of French policy on the quality and origin of agricultural products. …”
Get full text
Article