Showing 701 - 720 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 701
  2. 702
  3. 703
  4. 704
  5. 705
  6. 706
  7. 707

    A Clonal Selection Optimization System for Multiparty Secure Computing by Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu, Xiang Wu

    Published 2021-01-01
    “…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
    Get full text
    Article
  8. 708

    MODEL OF CREATION AND RE-ENGINEERING PRINCIPLES OF THE ECONOMIC SECURITY OF THE COMPANY by N. Unizhayev

    Published 2016-03-01
    “…The research allowed creating a model of economic security company. In the model, the factors influencing the process. …”
    Get full text
    Article
  9. 709
  10. 710

    Secure data collection method of WSN based on mobile Sink by Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG

    Published 2021-02-01
    “…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
    Get full text
    Article
  11. 711
  12. 712

    PHILOSOPHY OF WAR AND PEACE: IN SEARCH OF NEW EUROPEAN SECURITY STRATEGY by O. O. Bazaluk, D. B. Svyrydenko

    Published 2017-12-01
    Subjects: “…european security strategy…”
    Get full text
    Article
  13. 713

    Modeling and security analysis of hardware trojan attack based on GSCPN by MEI Bo, GUO Wei, CAO Zhipeng, LI Peijie, ZHANG Wenbo

    Published 2024-08-01
    “…Addressing the issue that research on hardware Trojan (HT) has predominantly focused on specific strategies of HT design and defense, with a deficiency in quantitative evaluation models for system security in the context of HT attacks, a HT attack and security assessment model based on the generalized stochastic coloring Petri net (GSCPN) was proposed. …”
    Get full text
    Article
  14. 714
  15. 715
  16. 716
  17. 717

    Partially blind proxy re-signature scheme with proven security by Xiaodong YANG, Chunlin CHEN, Ping YANG, Faying AN, Tingchun MA, Caifen WANG

    Published 2018-02-01
    “…In order to solve the problem of anonymity and controllability of blind proxy re-signature,the concept of partially blind proxy re-signature was introduced by using the idea of partially blind signature.Furthermore,the security definition of partially blind proxy re-signature was also given.Based on the improved Shao scheme,a partially blind proxy re-signature scheme in the standard model was proposed.The proposed scheme allows proxy to add some public information negotiated by delegatee and proxy to re-signature.The scheme not only can achieve the transparent signature conversion from delegatee to proxy and protect privacy of message re-signed by proxy,but also prevented illegal use of re-signature.Analysis results show that the proposed scheme is correct,multi-use,partially blind and existentially unforgeable.It is more suitable for e-government data exchange system,cross-domain authentication system and so on.…”
    Get full text
    Article
  18. 718
  19. 719
  20. 720