Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8621
Identity based and key insulated cryptosystem
Published 2009-01-01“…The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem ex-isting in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model was constructed.…”
Get full text
Article -
8622
Two Endotracheal Tubes in One Trachea with a Traumatic Injury
Published 2021-01-01“…We describe here the use of two endotracheal tubes simultaneously in the trachea to facilitate securing an airway which has been severely compromised by a self-inflicted wound to the trachea. …”
Get full text
Article -
8623
Unmanned Aerial Vehicles for Real-Time Vegetation Monitoring in Antarctica: A Review
Published 2025-01-01Get full text
Article -
8624
Do relationships with parents determine citizens’ reactions to war trauma?
Published 2024-02-01“…In contrast, a secure attachment style, along with frustration of the need for competence and intensity of threats, is a predictor of constructive defenses, while a secure attachment style is a predictor of PTG. …”
Get full text
Article -
8625
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01“…,the key was used for data confidentiality and/or integrity).There has been much interest in password-authenticated key exchange protocol which remains secure even when users choose passwords from a small space of possible passwords,such as a dictionary of English words.A password-based authenticated key exchange scheme was proposed.The analysis shows that the scheme is secure against dictionary attack under the computational Diffie-Hellman intractability assumption,and preserves user privacy and achieves unlinkability.Furthermore,since denial-of-service(DoS) attacks have become a common threat,DoS-resistantance is a design consid-eration and the scheme is proved to be secure against denial-of-service attacks.…”
Get full text
Article -
8626
Part 3. Clinical Practice Guideline for Airway Management and Emergency Thoracotomy for Trauma Patients from the Korean Society of Traumatology
Published 2020-09-01“…RSI should be performed in trauma patients to secure the airway unless it is determined that securing the airway will be problematic (1B). …”
Get full text
Article -
8627
Adaptability in the Brazilian Capital Market: Aspects Associated with Efficiency Reported by Companies Listed in B3
Published 2021-01-01“…In periods where interest rates are high, there is less efficiency in predicting securities. These results aim to contribute to the literature on adaptive markets by providing evidence on defining aspects of Brazilian securities' efficiency variability.…”
Get full text
Article -
8628
Short signature based on factoring problem in the standard model
Published 2011-01-01“…A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in this scheme was compromised of one element in,and the public key was short,requir-ing only the modulus N,one element of,one integer and one pseudorandom function seed.Compared with Hohen-berger’s RSA scheme(Crypto 09),the computaional cost of the sign algorithm and verification algorithm in this scheme is also much lower.…”
Get full text
Article -
8629
Private data isolation for OpenSSH based on virtual machines
Published 2009-01-01“…OpenSSH stores keys in the file system.The keys are easy to be exposed while the host has been invaded by illegal users.Methods are needed to protect these important data.For such purpose,virtual machine protection was pro-posed to provide a separate space for storing the important data as well as secure accessing interfaces.By using virtual machine even under the situation that the host is compromised,the important data can still be kept safe.Thus,the safe and separate space provided by virtual machine can protect the keys of OpenSSH securely.…”
Get full text
Article -
8630
Research and simulation of timing attacks on ECC
Published 2016-04-01“…Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.…”
Get full text
Article -
8631
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01“…In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. …”
Get full text
Article -
8632
Design of a SMS Based Voting System.
Published 2023“…This system is slow, expensive, less secure, not reliable, cumbersome and not very transparent. …”
Get full text
Thesis -
8633
Stochastic Linear Quadratic Control Problem on Time Scales
Published 2021-01-01Get full text
Article -
8634
Application of blockchain technology in digital music copyright management: a case study of VNT chain platform
Published 2025-01-01“…The system aims to enhance copyright proof and evidence storage, verify the originality of music copyrights, and facilitate secure copyright transactions.MethodsThe system leverages blockchain technology for data integrity and immutability, utilizes the Shazam algorithm to verify music originality, and employs smart contracts to secure transactions. …”
Get full text
Article -
8635
Deploying the Qline System for a QKD Metropolitan Network on the Berlin OpenQKD Testbed
Published 2025-01-01“…Quantum Key Distribution (QKD) systems have the potential to provide secure communication by offering unconditionally secure key exchange between distant parties. …”
Get full text
Article -
8636
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01“…A cryptographically-implemented high-speed source address verification scheme for the hosts in the IPv6 access subnet was proposed.The MAC address was used as the identity of the host machine and bounded with the host’s public key.Then the IPv6 address was derived from the host machine’s public key using the cryptographically generated address algorithm.The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm and stream authentication.The experimental system show that the scheme could ver fy the source addresses of data packets at a loss cost.Thus,it is a secure and feasible scheme.…”
Get full text
Article -
8637
Development and evaluation of a low-cost database solution for the Community Paramedicine at Clinic (CP@clinic) database.
Published 2024-12-01“…The aim of this project is to design a low-cost, portable, secure, user-friendly database for CP@clinic sessions and pilot test the database with paramedics and older adult volunteers. …”
Get full text
Article -
8638
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
Get full text
Article -
8639
Analysis of the existing methods of change of liquid glass properties
Published 2000-11-01“…The authors list methods of modification of silicate binding agent with the purpose to secure high quality of castings and ecological cleanliness.…”
Get full text
Article -
8640
Certificateless signature scheme without bilinear pairings
Published 2012-04-01“…To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key cryptography.Almost all existing certificateless signature schemes need bilinear pairings either during signature generation stage or the signature verification stage,and were proven secure only with stronger computational assumptions.A new certificateless signature scheme without pairings was proposed.The scheme is provably secure in the random oracle model(ROM)under the relatively weaker assumption,i.e.…”
Get full text
Article