期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Regulation of Private Security Companies and Equitable Policing in Nigeria
1
作者 Plangshak Musa Suchi 《Sociology Study》 2017年第3期146-159,共14页
Private security companies through the services they provide complement the police in crime prevention, order maintenance, and general improvement of security in societies thereby contributing to sustainable national ... Private security companies through the services they provide complement the police in crime prevention, order maintenance, and general improvement of security in societies thereby contributing to sustainable national development In order to fully benefit from their contribution and prevent them from engaging in illegal activities, states formulate and enforce policies that seek to regulate their activities. This paper examines the regulation of private guards companies in Nigeria using Abuja as its empirical core. The main aim is to promote understanding of how the private security industry is regulated and evaluate the effectiveness of the existing regulatory policy. Data for the paper were generated from in-depth interviews with the NSCDC (Nigeria Security and Civil Defence Corps), analysis of the policy for PSCs (private security companies), and a review of the annual performance report of the regulatory agency. The results revealed that the current system of PSC regulation is characterized by a lack of specialty classification of private security licences, limited regulatory scope with a focus on licensing of companies, lack of uniform standards on training, and high cost/difficulties in obtaining operational license. The paper concludes that the current regulatory setup for PSCs in Nigeria is ineffective and unsustainable and recommends an urgent review of the legal framework to alien its provisions with global standards and practices in the private security industry. 展开更多
关键词 private security equitable policing regulatory policy sustainable development
下载PDF
Private Car Ownersip Jumps 16% in 6 Months
2
《China's Foreign Trade》 2007年第14期33-33,共1页
More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
关键词 private Car Ownersip the Ministry of Public security motorcyycles car driver
下载PDF
Cryptanalysis of a Completely Anonymous Multi-recipient Signcryption Scheme with Public Verification
3
作者 张波 孙涛 于代荣 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期240-243,共4页
Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was s... Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeability under selective multi-ID,chosen message attack.Unfortunately,by giving concrete attacks,named " inside attack" and " outside attack" respectively,we indicate that Pang et al.'s scheme is not secure in their security model. 展开更多
关键词 recipient private claimed secure giving message signer outside secret chosen
下载PDF
Design and Application of Cloud Test Platform for Launch Vehicle Electrical System Based on Data-Driven Approach
4
作者 ZHANG Qian LIU Liang SHEN Xiang 《Aerospace China》 2022年第4期45-51,共7页
In order to improve efficiency of the integrated test of a launch vehicle electrical system while meeting the requirement of high-density,a cloud test platform for the electrical system was designed based on a data-dr... In order to improve efficiency of the integrated test of a launch vehicle electrical system while meeting the requirement of high-density,a cloud test platform for the electrical system was designed based on a data-driven approach,using secure private cloud technology and virtualization technology.The platform has a general hardware and software architecture,which integrates the functions of graphical editing,automated testing,data processing,fault diagnosis and so on.It can realize multi-task parallel testing.Compared with the traditional test mode,the platform has obvious advantages on testing eficiency and effectiveness. 展开更多
关键词 data driven secure private cloud cloud test platform VIRTUALIZATION
下载PDF
Quantum Private Comparison of Equal Information Based on Highly Entangled Six-Qubit Genuine State 被引量:4
5
作者 纪兆旭 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第6期711-715,共5页
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ... Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP. 展开更多
关键词 quantum private comparison highly entangled six-qubit genuine state security
原文传递
t-Private and t-Secure Auctions
6
作者 Markus Hinkelmann Andreas Jakoby Peer Stechert 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第5期694-710,共17页
In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically se... In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties 展开更多
关键词 multi-party private and secure computation garbled circuits private auctions
原文传递
Secure Sensitive Data Sharing on a Big Data Platform 被引量:12
7
作者 Xinhua Dong Ruixuan Li +3 位作者 Heng He Wanwan Zhou Zhengyuan Xue Hao Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期72-80,共9页
Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.Howev... Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security. 展开更多
关键词 secure sharing sensitive data big data proxy re-encryption private space
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部