Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1261
Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability
Published 2014-01-01Get full text
Article -
1262
Robust dead-beat synchronization of discrete chaotic systems and application to secure communications
Published 2008-01-01Subjects: Get full text
Article -
1263
Research on fusion model based on deep learning for text content security enhancement
Published 2020-05-01Subjects: “…content security…”
Get full text
Article -
1264
Data security protection schema of telecom operators under the environment of big data
Published 2017-05-01Subjects: Get full text
Article -
1265
UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database
Published 2015-10-01Subjects: “…information security…”
Get full text
Article -
1266
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01“…A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in outsourcing computation.A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations.It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method.It also improves the verification effciency and reduces the complexity of space.The performance analysis shows that the scheme is highly efficient.…”
Get full text
Article -
1267
Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
Published 2013-11-01“…Therefore, how to realize digital media security effectively is becoming a challenging problem. …”
Get full text
Article -
1268
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01“…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
Get full text
Article -
1269
Access to information about the activities of the Security Service of Ukraine in the context of countering disinformation
Published 2022-06-01Subjects: Get full text
Article -
1270
Blockchain applications in managing oral oncology patient data: Privacy, security, and beyond
Published 2024-06-01Get full text
Article -
1271
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01Subjects: Get full text
Article -
1272
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01Subjects: “…information security…”
Get full text
Article -
1273
Research on endogenous security data sharing mechanism of F-RAN for 6G
Published 2021-01-01Subjects: Get full text
Article -
1274
Multi-source data security protection of smart grid based on combination key
Published 2020-01-01Subjects: Get full text
Article -
1275
ENVIRONMENTAL EXTREMISM AS A NEW CHALLENGE OF ECONOMIC SECURITY OF INDUSTRIAL ORGANIZATIONS IN RUSSIA
Published 2016-06-01Subjects: Get full text
Article -
1276
Efficient and secure multi-user outsourced image retrieval scheme with access control
Published 2021-10-01“…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
Get full text
Article -
1277
Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network
Published 2014-01-01Get full text
Article -
1278
The Effect of HIV/AIDS Scourge on Food Security in Nyabbani Subcounty, Kitagwenda District.
Published 2023“…The purpose of this research was to assess, analyze, find out, and gather the effect of HIV/AIDS scourge on food security in Nyabbani sub-county, Kitagwenda district.…”
Get full text
Thesis -
1279
Impact of Climate Change on Food Security in Kashare Sub-County, Mbarara District.
Published 2024Subjects: Get full text
Thesis -
1280
Impact of Climate Change on Food Security in Kashare Sub-County Mbarara District.
Published 2024Subjects: Get full text
Thesis