
Security
-
This paper explores the applications of Big Data in business network analysis, focusing on how it enhances supply chain visibility, risk management, and demand forecasting. It also addresses challenges like data privacy, security, and managing large datasets.
11p
vijiraiya
19-05-2025
1
1
Download
-
The integration of Blockchain technology with the Internet of Things (IoT) presents a transformative approach to addressing critical challenges in security, data integrity, and automation. This paper explores the synergies between these technologies, proposing a framework that leverages the decentralized and immutable nature of Blockchain to enhance IoT ecosystems.
11p
vijiraiya
19-05-2025
3
1
Download
-
Lecture Cryptography: Authentication (Part 2) continues with hash functions and message authentication codes. The lecture highlights how cryptographic hashes play a role in verifying data integrity and origin. It also presents practical tools used to ensure authenticity in digital communications. Please refer to the lecture for more details!
36p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Authentication (Part 3) continues the exploration of message authentication and hash functions. The lecture reinforces key cryptographic tools to prevent tampering and verify message legitimacy. It provides practical perspectives on implementing secure communications. Please refer to the lecture for more details!
32p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Cryptography Applications (Part 1) introduces real-world applications of cryptographic principles in authentication, key negotiation, and secure protocols. Topics include SSL/TLS, IPSec, SSH, and Kerberos. The lecture emphasizes practical implementation in networks and systems. Please refer to the lecture for more details!
62p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Cryptography Applications (Part 2) explores modern applications of cryptography in blockchain systems. It covers secure transactions, consensus mechanisms, and network architecture. This lecture illustrates how cryptography underpins the security and trust of decentralized platforms. Please refer to the lecture for more details!
46p
hoatrongguong03
15-05-2025
2
1
Download
-
Lecture Cryptography: Cryptology Overviews introduces the fundamental concepts of cryptography and its applications. The lecture explores core terminologies, classical cipher systems, and the evolution of algorithms in cryptographic science. It sets the stage for understanding the practical use of cryptography in securing information. Please refer to the lecture for more details!
60p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Modern Symmetric Ciphers (Part 2) delves into the Advanced Encryption Standard (AES) and modes of operation. The lecture explains how AES improves upon previous methods and introduces multiple techniques for secure encryption processing. It also examines how data can be handled in different cipher modes. Please refer to the lecture for more details!
74p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Modern Asymmetric Ciphers (Part 2) introduces core public-key algorithms such as the ElGamal cipher and Diffie-Hellman key exchange. These methods are critical for secure communication in decentralized environments. The lecture emphasizes their mathematical foundations and security properties. Please refer to the lecture for more details!
22p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Asymmetric Ciphers (Part 3) extends into advanced asymmetric systems, including logarithm-based encryption and elliptic curve cryptography. It also introduces quantum-resistant algorithms, emphasizing future-oriented cryptographic security. This lecture highlights ongoing innovations in public-key systems. Please refer to the lecture for more details!
42p
hoatrongguong03
15-05-2025
1
1
Download
-
Local governance is not a new issue in the world, but in Vietnam, the term of local governance has only been mentioned and studied in depth in the past few years. Local governance can be understood as a set of entities that have the ability to impact, control and influence economic, cultural, social development, political and security situations, as well as the planning, promulgation of policies and planning at the local level.
6p
vinarutobi
06-05-2025
1
1
Download
-
This study delves into the security vulnerabilities of blockchain consensus mechanisms and the source code, providing insights into the cybersecurity challenges facing the DeFi sector.
7p
visarada
28-04-2025
1
1
Download
-
This process aims to optimize healthcare data management, enhance the quality of care, and enable remote health monitoring. The ultimate goal is to establish a smart healthcare system that prioritizes public health and promotes sustainable development. In this context, the development of high-tech and multifunctional healthcare is an inevitable and crucial trend that aligns with the principles of security and efficiency in healthcare.
13p
visarada
28-04-2025
1
1
Download
-
This research proposes a blockchain-based knowledge system for EMR management, utilizing the Hyperledger Fabric framework and machine learning (ML) algorithms. By combining the immutable and decentralized nature of blockchain with the predictive capabilities of ML, this system aims to support medical diagnostics and decision-making, with a specific focus on stroke prediction.
9p
visarada
28-04-2025
1
1
Download
-
This paper presents the impacts of Electric Vehicle Charging Stations (EVCSs) on voltage and frequency quality in the Microgrid. It addresses security analysis, voltage and frequency quality, as well as issues related to EVCSs.
13p
viling
11-10-2024
3
1
Download
-
This article proposes a solution by advocating for the integration of multimedia technology into educational software, offering interactive simulations, virtual reality experiences, and mulmedia presentaons to bring national defense and security concepts to life.
8p
viling
11-10-2024
2
1
Download
-
Using case study method in National Defense - Security Education at high schools in Ho Chi Minh city
This study examines the implementation of the case study method in teaching National Defense - Security Education in Ho Chi Minh City high schools. A survey of 50 teachers and 200 students from three high schools reveals that while the case study method has been introduced, its application remains limited, with an average score of 3.19.
10p
viling
11-10-2024
1
1
Download
-
This paper introduces the application of artificial intelligence to build a security control software system in local military units. This software system uses state-of-the-art convolutional neural networks (CNN SOTA) for facial recognition by testing two of the best facial recognition models currently available: the FaceNet model and the VGGFace model.
8p
vifilm
11-10-2024
6
1
Download
-
This study was conducted. Moreover, it is shown that choosing the best Tx/Rx parameters is necessary to meet service quality requirements such as BER and transmission confidentiality. The provided findings provide insightful information about the practical considerations of deploying UWOC/ CDMA systems.
11p
viengfa
28-10-2024
3
1
Download
-
In recent years, landslides are taking place very seriously, and tend to increase in both scope and scale, threatening people's lives and properties. Therefore, timely detection of landslide areas is extremely important to minimize damage. In this paper, an improved algorithm for partitioning data with reliability problems using multiple fuzzifiers named as TSSFC is introduced.
9p
viengfa
28-10-2024
5
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
