Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3481
Building Application-Related Patient Identifiers: What Solution for a European Country?
Published 2008-01-01“…We propose a method utilizing a derived social security number with the same reliability as the social security number. …”
Get full text
Article -
3482
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
3483
Attribute-based key-insulated signcryption with bidirectional anonymity
Published 2013-11-01“…To solve exposure of secret key in attribute-based signcryption with anonymity for both sender and receiver, key-insulation mechanism to attribute-based signcryption was untroduced.Given the formal definition and security no-tions,the scheme of attribute-based key-insulated signcryption was proposed,which is provably secure under the random oracle model.The improved scheme not only satisfies the requirement of bidirectional anonymity,but also achieves for-ward security and afterward security,consequently reduced the hazard of key exposure.Finally, confidentiality, authenti-cation and anonymity in attribute-based key-insulated signcryption scheme were proved based on given security notions.…”
Get full text
Article -
3484
Robust Spectrum Sensing Demonstration Using a Low-Cost Front-End Receiver
Published 2015-01-01Get full text
Article -
3485
Research and realization on USBKEY based network storage user data protection
Published 2018-06-01“…Network storage services such as network hard disk and cloud storage are widely used.However,due to the relative flexibility of network hard disk and cloud storage,it has to face many security risks.Based on the data encryption protection mechanism of USBKEY,data encryption and storage service,the key is stored in USBKEY,will eventually “service level provide security” elaboration to the "real master security" to achieve the purpose of user control of data security.…”
Get full text
Article -
3486
Naval fleet across-domain communication scheme based on CP-ABE
Published 2015-11-01“…Attribute-based encryption (ABE) provides a fine-grained access control mechanism and it can realize one-to-many secure communication.Proxy re-encryption can transform an encrypted data to another kind encrypted between different domains.Aiming at the demand of secure communication of across-domain naval fleet,a scheme that based on CP-ABE was proposed.At last,a security analysis of this scheme and an example of the scheme were proposed.This scheme combining the technology of ABE and proxy re-encryption realizes a secure communication of across-domain naval fleet and one-to-many secure communication among the naval fleet.At the meantime,it meets the needs of meet and access of vessel.…”
Get full text
Article -
3487
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
Published 2019-01-01“…The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. …”
Get full text
Article -
3488
Survey of community privacy in social network
Published 2021-04-01“…Community is an important feature of social network and the development of community detection technology brings the danger of privacy disclosure to network users.How to protect sensitive community information from being leaked and ensure the security of users and communities has become a research hotspot in the field of network security.In recent years, community privacy protection technology has made initial progress, but there is a few survey on the research of community privacy or community security in social networks, and it may limit the potential and long-term development of this research topic.The research on the privacy of community structure was mainly reviewed and the related works on community security were classified, summarized, compared.The hot issues of community security in the future were proposed.…”
Get full text
Article -
3489
Design and Implementation of a Data Sharing Model for Improving Blockchain Technology
Published 2022-01-01“…Thus, data sharing and security are vital to realizing the value of the data. …”
Get full text
Article -
3490
New Work Forms: How to Integrate Them in Our Social Insurances
Published 2020-04-01“…Abstract The increase in the group of atypical workers means that their social security protection needs reviewing. How far should we go in approaching social security for self-employed workers, flex workers, crowd workers and all new employment relationships differently? …”
Get full text
Article -
3491
Analysis and improvement of the BACnet/IP based on identity authentication
Published 2024-03-01“…To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the protocol and modeling it using colored Petri net theory and CPN Tools, vulnerabilities in the security of BACnet/IP were identified.An improvement scheme was proposed based on the Dolev-Yao attacker model and formal analysis method.The BACnet/IP-SA protocol utilized the device’s pseudo-identity to safeguard the actual identity information.It emploied the PUF response for authentication and verified the authenticity of the counterparty’s identity.The session key was generated through the authentication value of the multi-information set.The protocol’s security was demonstrated by combining BAN logic and non-formal methods.The experimental results indicate that the proposed scheme can effectively resist security threats from multi-class attacks and key leakage, enhancing the security of the protocol authentication while reducing computational overhead.…”
Get full text
Article -
3492
SensoTrust: Trustworthy Domains in Wireless Sensor Networks
Published 2015-07-01“…Security domains can be deployed as an add-on service to merge with any service already deployed, obtaining a new secured service.…”
Get full text
Article -
3493
Is Securitisation a Natural and Useful Response to Existential Threats? Introducing the Idea of Peacification
Published 2025-01-01“…After all, security is a property of an agent, while security issues traditionally arise from threats posed by another agent. …”
Get full text
Article -
3494
Enterprise internal audit data encryption based on blockchain technology.
Published 2025-01-01“…Blockchain along with secure databases like encryption improves internal audit security through immutability and transparency. …”
Get full text
Article -
3495
A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)
Published 2024-01-01Get full text
Article -
3496
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01“…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
Get full text
Article -
3497
An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things
Published 2018-01-01“…It establishes the secure channel and provides a guarantee for secure session for the OPC Unified Architecture server and client. …”
Get full text
Article -
3498
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Published 2011-01-01“…Aiming at the security of authentication protocol for heterogeneous wireless network,a mutual authentication and key agreement protocol,which was based on CPK algorithm and improved ECDH algorithm,was proposed.The temporary authentication identity and temporary communication identity was adopted to realize user identity anonymity.The ordered pair of temporary communication identity was proposed to prevent replay attack in the process of re-authentication.The risk of key compromise was also avoided in the proposed protocol.By security analysis,this protocol had the security properties such as identity authentication,key security and anonymity.…”
Get full text
Article -
3499
Prototype Of DPO Search Information System (People Search List) On CCTV Cameras Using Face Recognition
Published 2023-12-01“…The efficiency aspect of the housing security sector is the main consideration in creating information technology in a CCTV security development, because so far CCTV has not guaranteed maximum housing security, because CCTV can only record not analyze. …”
Get full text
Article -
3500
Le gouvernement sécuritaire palestinien au prisme de l’émeute
Published 2020-10-01“…Since 2007, the role of the security apparatus in the Palestinian Authority's (PA) management of populations under its control has increased significantly. …”
Get full text
Article