Showing 1,141 - 1,160 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 1141
  2. 1142
  3. 1143

    Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks by Liming Zhou, Yingzi Shan, Lu Chen

    Published 2018-01-01
    “…To deal with this problem, we propose a secure and efficient scheme for cluster-based query processing in wireless sensor networks. …”
    Get full text
    Article
  4. 1144
  5. 1145

    Instruction and demonstration-based secure service attribute generation mechanism for textual data by LI Chenhao, WANG Na, LIU Aodi

    Published 2024-12-01
    “…Attribute-based access control is fundamentally dependent on the secure service attribute calibration of object sources. …”
    Get full text
    Article
  6. 1146

    Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches by Mahmood Al-Bahri, Wasin Alkishri, Falah Y. H. Ahmed, Marwan Alshar'e, Sanad Al Maskari

    Published 2024-03-01
    “…Furthermore, this study presents a security model that aims to strengthen the resolution system based on data transmission security. …”
    Get full text
    Article
  7. 1147
  8. 1148
  9. 1149
  10. 1150
  11. 1151
  12. 1152

    Secure deduplication and integrity audit system based on convergent encryption for cloud storage by Xiao-yong GUO, An-min FU, Bo-yu KUANG, Wei-jia DING

    Published 2017-11-01
    “…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
    Get full text
    Article
  13. 1153

    The Long-Term Effects of Reforming Social Security to Relieve Low-Income Households by Tom Krebs, Martin Scheffel, Manuela Barišić, Valentina Sara Consiglio

    Published 2021-10-01
    “…Abstract In this paper, we use a macroeconomic model to evaluate two reform proposals that, first, abolish the exemption from social security contributions for marginal employment (“mini jobs”) and, second, reduce social security contributions for low-income earners. …”
    Get full text
    Article
  14. 1154
  15. 1155
  16. 1156
  17. 1157

    Secure opportunistic access control in D2D-enabled cellular network by Yajun CHEN, Xinsheng JI, Kaizhi HUANG, Jing YANG, Ming YI

    Published 2018-01-01
    “…The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them,a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly,only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users,and the impacts of interference thresholds were discussed on their performances.Next,an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users,thus achieving the optimal performance.Finally,simulation results verify the validity of the proposed scheme.…”
    Get full text
    Article
  18. 1158

    Editorial: Multilevel medical security systems and big data in healthcare: trends and developments by Fei Fan, Siqin Wang

    Published 2025-01-01
    Subjects: “…multilevel medical security systems…”
    Get full text
    Article
  19. 1159
  20. 1160