Showing 101 - 120 results of 9,720 for search '"security"', query time: 0.11s Refine Results
  1. 101

    Security of the cryptosystems based on ergodic matrices by Hua-wei HUANG, Chang-wen PENG, Yun-yun QU, Chun-hua LI

    Published 2015-08-01
    “…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
    Get full text
    Article
  2. 102
  3. 103

    Research on the Solution of Business Platform Security by Yanchun Wang, Hong Li

    Published 2013-08-01
    Subjects: “…business platform security…”
    Get full text
    Article
  4. 104
  5. 105
  6. 106

    Emerging international regime of information security by S. V. Shitkov, T. A. Polyakova, A. A. Smirnov

    Published 2021-11-01
    Subjects: “…international information security…”
    Get full text
    Article
  7. 107

    Survey on network security based on blockchain by Ye CHEN, Dongjin XU, Liang XIAO

    Published 2018-03-01
    Subjects: “…network security…”
    Get full text
    Article
  8. 108
  9. 109
  10. 110
  11. 111
  12. 112

    Virtualization security:the good,the bad and the ugly by Yu-tao LIU, Hai-bo CHEN

    Published 2016-10-01
    Subjects: “…virtualization security…”
    Get full text
    Article
  13. 113

    Right of Access to Information and Media Security by V. P. Kirilenko, G. V. Alekseev

    Published 2019-10-01
    “…With the development of virtual law institutions, the priority of media security is to preserve the superiority of creative works created by man over the results of computer processing of information. …”
    Get full text
    Article
  14. 114

    Wireless secure enhancement with cooperative jamming by Li-juan ZHANG, Zhi-hong LIU, Hong-bo ZHANG, Yong ZENG, Jian-feng MA

    Published 2017-02-01
    “…Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.…”
    Get full text
    Article
  15. 115

    Secure Pesticide Storage: General Features by Frederick M. Fishel

    Published 2009-12-01
    “…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  16. 116
  17. 117

    Secure Pesticide Storage: General Features by Frederick M. Fishel

    Published 2009-12-01
    “…Published by the UF Department of Agronomy, October 2009. PI33/PI068: Secure Pesticide Storage: General Features (ufl.edu) …”
    Get full text
    Article
  18. 118
  19. 119

    Discussion on the cultivation of cyber security talents by Jian WENG, Linfeng WEI, Yue ZHANG

    Published 2019-06-01
    Subjects: “…cyber security…”
    Get full text
    Article
  20. 120