Results 31 to 40 of about 1,402,735 (323)
A Group Law on the Projective Plane with Applications in Public Key Cryptography
In the context of new threats to Public Key Cryptography arising from a growing computational power both in classic and in quantum worlds, we present a new group law defined on a subset of the projective plane F P 2 over an arbitrary field F
Raúl Durán Díaz +2 more
doaj +1 more source
FEATURES OF THE TRANSFORMATION OF LEGAL THEORY UNDER MARTIAL LAW
Purpose. The aim of this work is to discuss the features of the functioning of legal theory and scientific activities under martial law. Methodology.
Humeniuk Tetjana
doaj +1 more source
THE NEED FOR HARMONIZATION OF THE MACEDONIAN PROPERTY LAW
Subject of analysis in this paper is the development of contemporary property law in the legal system of the Republic of North Macedonia and the need for its harmonization.
Rodna Zhivkovska, Tina Przheska
doaj
Regulating a “Cyber Militia” – Some Lessons from Ukraine, and Thoughts about the Future
This article analyzes the contribution to modern warfare that might potentially be made by the “cyber militia” – a body of volunteers undertaking defense-related activities in cyberspace on behalf of a state, with that state’s formal recognition, and ...
Dan Jerker B. Svantesson
doaj +1 more source
Real-Time Violent Action Recognition Using Key Frames Extraction and Deep Learning
: Violence recognition is crucial because of its applications in activities related to security and law enforcement. Existingsemi-automatedsystems have issues such as tedious manual surveillances, which causes human errors and makes these systems less ...
Muzamil Ahmed +7 more
semanticscholar +1 more source
Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley +1 more source
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Categorization of objects of critical information infrastructure of water transport [PDF]
The transport complex is a complex network with many add-ins and the transfer of large amount of information in real time. Identifying the critical transport information infrastructure is the first step in the process of ensuring security and protecting ...
Sokolov Sergey +3 more
doaj +1 more source
Development of the instrumentation of the botafoc breakwater nº 8 caisson [PDF]
Balearic Port Authority has developed an instrumentation system for the #8 caisson of the Botafoc breakwater that integrates 12 pressure sensors located at three surfaces, two in contact with the sea water and another with the bottom.
Almazan Garate, Jose Luis +3 more
core +1 more source
Framework and Challenges of Cyber Security in India: An Analytical Study
Cyber security threats come in a wide variety of forms, including ransomware, phishing, malware attacks, and many others. India is currently ranked 11th in the world in terms of the number of local cyberattacks and it has already experienced 2,399,692 of
A. Panneerselvam
semanticscholar +1 more source

