Showing 1,561 - 1,580 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1561
  2. 1562

    Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs by Anitha Veerasamy, Srinivasa Rao Madane, K. Sivakumar, Audithan Sivaraman

    Published 2016-01-01
    “…However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. …”
    Get full text
    Article
  3. 1563
  4. 1564

    Audit Analysis of Abnormal Behavior of Social Security Fund Based on Adaptive Spectral Clustering Algorithm by Yan Wu, Yonghong Chen, Wenhao Ling

    Published 2021-01-01
    “…Abnormal behavior detection of social security funds is a method to analyze large-scale data and find abnormal behavior. …”
    Get full text
    Article
  5. 1565
  6. 1566

    CONCEPTUALIZING ENVIRONMENTAL POLICY: AN ANALYSIS OF RUSSIAN AND INTERNATIONAL LEGISLATION IN THE CONTEXT OF ENSURING ENVIRONMENTAL SECURITY IN THE ARCTIC by Elena M. Klyuchnikova, Vladimir A. Masloboev, Vladimir V. Dyadik, Andrey V. Masloboev, Natalia V. Dyadik, Anastasia N. Chapargina

    Published 2024-12-01
    “…This article presents the results of a study aimed at identifying differences in the environmental security policies embedded in the current legislation of Russia, China, the USA, and the European Union. …”
    Article
  7. 1567
  8. 1568
  9. 1569
  10. 1570
  11. 1571

    A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility by Aviral Goel, Yogachandran Rahulamathavan

    Published 2024-12-01
    “…Traditional identity management (IdM) solutions based on centralised protocols, such as Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML), are where a central authority manages all the processes. …”
    Get full text
    Article
  12. 1572
  13. 1573
  14. 1574
  15. 1575

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
    Get full text
    Article
  16. 1576
  17. 1577

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication by Banghua Wu, Shah Nazir, Neelam Mukhtar

    Published 2020-01-01
    “…Security has become one of the important factors for any network communication and transmission of data packets. …”
    Get full text
    Article
  18. 1578

    Oral Health Status and Anxiety Level Amongst the Borderline Security Force Personnel and Their Family Members by Deepali Agarwal, Bharathi Purohit, Upendra Singh Bhadauria, Sneha Malhotra, Manali Deb Barma, Harsh Priya

    Published 2025-02-01
    “…The primary role of border security personnel is to safeguard borders against illegal trans-border activities during peacetime and provide military support during wartime. …”
    Get full text
    Article
  19. 1579

    Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture by Xuejiao LIU, Tiancong CAO, Yingjie XIA

    Published 2023-03-01
    “…To solve the problems of data disclosure, uncontrolled data access, and inefficiency of cross-domain data sharing in the Internet of vehicles (IoV), an efficient and secure cross-domain data sharing scheme of IoV under blockchain architecture was proposed.A blockchain was maintained by trusted authorities of different trust domains.A modified ciphertext-policy attribute-based encryption scheme was adopted to encrypt data, and encrypted data was stored in interplanetary file system (IPFS) with relevant information recorded on the blockchain, constructing a fine-grained and secure cross-domain data sharing scheme based on blockchain.A verification algorithm for cross-domain access based on the garbled Bloom filter was designed, and a smart contract executed fast decryption tests based on access policies on the blockchain, improving the access efficiency of a mass of ciphertext.A cross-domain data access method based on outsourcing decryption was designed, and the trusted authorities transformed ciphertexts while performing outsourcing decryption with complex bilinear pairing calculations, reducing the time overhead of vehicle decryption.Experiment results show that the proposed scheme is superior to other schemes in the process of cross-domain ciphertext transformation and vehicle decryption, and the cross-domain data access efficiency is increased by 60% on average.…”
    Get full text
    Article
  20. 1580