Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1121
Intensified Drought Threatens Future Food Security in Major Food-Producing Countries
Published 2024-12-01Subjects: “…food security…”
Get full text
Article -
1122
Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher
Published 2023-04-01“…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
Get full text
Article -
1123
-
1124
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01Subjects: Get full text
Article -
1125
TURKEY’S SEARCH FOR SECURITY AND THE SOVIET FACTOR DURİNG THE SECOND WORLD W AR
Published 2014-05-01Subjects: “…turkey’s search ;for security ; the soviet factor duri̇ng the second world w ar…”
Get full text
Article -
1126
THE TRANSFORMATIONAL EVOLUTION OF THE ROMANIAN INTELLIGENCE SERVICE-SRI IN THE LIGHT OF THE SECURITY SECTOR REFORM
Published 2024-12-01Subjects: “…security sector reform…”
Get full text
Article -
1127
Design and application research on management information system security architecture in digital campus
Published 2014-10-01Subjects: Get full text
Article -
1128
DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks
Published 2015-11-01“…In this work we propose a Dynamic Security System to be applied in the shared sensor network context. …”
Get full text
Article -
1129
Research of duality and multi-level security model based on intransitive noninterference theory
Published 2009-01-01Subjects: “…multi-level security…”
Get full text
Article -
1130
-
1131
Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks
Published 2018-01-01“…To deal with this problem, we propose a secure and efficient scheme for cluster-based query processing in wireless sensor networks. …”
Get full text
Article -
1132
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01“…IET Information Security…”
Get full text
Article -
1133
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01“…Attribute-based access control is fundamentally dependent on the secure service attribute calibration of object sources. …”
Get full text
Article -
1134
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Published 2024-03-01“…Furthermore, this study presents a security model that aims to strengthen the resolution system based on data transmission security. …”
Get full text
Article -
1135
Video Fingerprint Management System:Exploration and Practice on Video Content Security Protection
Published 2015-06-01Subjects: Get full text
Article -
1136
Study on chaos phase space synchronous rotation and distinguish switching security communication
Published 2016-10-01Subjects: Get full text
Article -
1137
Research on enhancing the security of IoT terminals based on non-IP and SCEF technology
Published 2017-02-01Subjects: Get full text
Article -
1138
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
1139
Secure communication approach for Internet of things based on C-RAN fronthaul compression
Published 2018-09-01Subjects: Get full text
Article -
1140
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01“…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
Get full text
Article