Results 41 to 50 of about 13,471 (161)

Study on multi-level security issues of digital mine

open access: yesGong-kuang zidonghua, 2013
The paper analyzed research status of digital mine with background of ongoing demonstration digital mine construction and completed digital mine planning and research of Shenhua Group, and pointed out that the digital mine was a typical multi-level ...
ZHANG Qi   +4 more
doaj   +1 more source

Finite-key security analysis for multilevel quantum key distribution

open access: yesNew Journal of Physics, 2016
We present a detailed security analysis of a d -dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario.
Kamil Brádler   +4 more
doaj   +1 more source

A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization

open access: yesEntropy, 2019
Limitations of the computational and energy capabilities of IoT devices provide new challenges in securing communication between devices. Physical layer security (PHYSEC) is one of the solutions that can be used to solve the communication security ...
Mike Yuliana, Wirawan, Suwadi
doaj   +1 more source

Cooperation between Branches of Power of the Russian Federation and the Republic Of Armenia as the Basis of Implementation of Foreign Policy Courses on Military Security

open access: yesУправленческое консультирование, 2018
The article investigates the interaction of various authorities of the Russian Federation and the Republic of Armenia in the sphere of military security.
Ekaterina Sergeevna Andreeva
doaj   +1 more source

Non‐volatile and Secure Optical Storage Medium with Multilevel Information Encryption

open access: yesAdvanced Science
Non‐volatile photomemory based on photomodulated luminescent materials offers unique advantages over voltage‐driven memory, including low residual crosstalk and high storage speed.
Jie Shao   +6 more
doaj   +1 more source

Research on Thematic Risk Map Knowledge Recommendation from the Perspective of Public Security Prevention and Control

open access: yesRedai dili
As a crucial visual aid for security information representation, thematic maps not only help public security management departments understand regional security conditions but also guide police deployment and patrol planning.
Shen Tianqi, Zheng Wen, Li Weihong
doaj   +1 more source

A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls

open access: yesApplied Sciences
The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively.
Jun-Hyung Park   +2 more
doaj   +1 more source

Chaotic Multilevel Separated Encryption for Security Enhancement of OFDM-PON

open access: yesIEEE Access, 2019
A chaotic multilevel separated encryption (CMSE) scheme is proposed for physical layer security enhancement of orthogonal frequency division multiplexing passive optical network (OFDM-PON).
Hanhan Wei   +4 more
doaj   +1 more source

Models of multilevel databases security

open access: yesUkrainian Information Security Research Journal, 2018
Багаторівнева безпека - це політика безпеки, яка дозволяє класифікувати об'єкти і користувачів на основі системи ієрархічних рівнів безпеки і використовувати таку класифікацію для організації системи управління доступом. В реляційних базах даних з багаторівневою безпекою будь-якому читаючому або оновлюючому дані в таблиці користувачеві, має бути ...
openaire   +1 more source

Home - About - Disclaimer - Privacy