Showing 3,501 - 3,520 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 3501

    Realization of smart home key management mechanism based on ECC by Wenbin CHENG, Jia LIU

    Published 2017-06-01
    “…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
    Get full text
    Article
  2. 3502

    Blockchain data access control scheme based on CP-ABE algorithm by Yunxiang QIU, Hongxia ZHANG, Qi CAO, Jiancong ZHANG, Xingshu CHEN, Hongjian JIN

    Published 2020-06-01
    “…Different from the public chain,the consortium blockchain Hyperledger Fabric integrates the additional member management service(MSP) mechanism to provide channel-based data isolation protection.However,the data isolation protection mechanism still synchronizes the plaintext data within a channel,so there is a risk of data leakage.Besides,the channel-based data access control mechanism does not apply to some fine-grained privacy protection scenarios.To solve the problems of data privacy and security involved in the consortium chain Hyperledger mentioned above,a blockchain data access control scheme based on the CP-ABE algorithm was proposed.Based on the original existing Fabric-CA module in the Hyperledger,our scheme can realize the secure distribution of user attribute keys in the CP-ABE scheme while implementing the fine-grained security access control of blockchain data at the user level.The security analysis shows that the scheme achieves the security goals of ABE user attribute private key security distribution and data privacy protection.The performance analysis also shows that the proposed scheme has good usability.…”
    Get full text
    Article
  3. 3503

    Identity-based encryption scheme against adaptive leakage by Jia-hui TANG, Yan-qin ZHU, Xi-zhao LUO

    Published 2012-07-01
    “…In allusion to the problem that scheme resilient to adaptive leakage was lacked in identity-based encryption,a notion of entropic leakage-resilient was used to define the security against adaptive leakage in IBE.Then by using identity-based hash proof system and extractors,an adaptive-leakage secure IBE scheme was proposed.And for instantiation,an IBE scheme against adaptive leakage based on q-TABDHE assumption was constructed.Security analysis shows that the scheme achieves chosen-plaintext attack security,and it can not only resist adaptive leakage effectively,but also tolerate more key leakage.…”
    Get full text
    Article
  4. 3504

    Analysis and improvement of an ID-based authenticated key agreement protocol by WANG Xiao-fen1, CHEN Yuan1, XIAO Guo-zhen1

    Published 2008-01-01
    “…The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. …”
    Get full text
    Article
  5. 3505

    Automotive ethernet controller authentication method based on national cryptographic algorithms by Hui GUO, Yong LUO, Xiaolu GUO

    Published 2022-12-01
    “…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
    Get full text
    Article
  6. 3506

    Automatic Algorithm for Fractal Plant Art Image Similarity Feature Generation by Zhizhe Liu, Luo Sun

    Published 2021-01-01
    “…The scheme combines SIFT (scale-invariant feature transform) feature secure extraction and locally sensitive hashing algorithm to achieve secure extraction of BOVW features of images. …”
    Get full text
    Article
  7. 3507
  8. 3508

    An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks by Shahwar Ali, A Humaria, M Sher Ramzan, Imran Khan, Syed M Saqlain, Anwar Ghani, J Zakia, Bander A Alzahrani

    Published 2020-06-01
    “…The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. …”
    Get full text
    Article
  9. 3509

    Trusted auditing method of virtual machine based on improved expectation decision method by Junfeng TIAN, Yongchao ZHANG

    Published 2018-06-01
    “…Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost and benefit of audit scheme was digitized,and a virtual machine trusted auditing strategy based on improved expectation decision method was proposed.Several levels of security protection for the user virtual machine was provided,and the optimal audit scheme was selected autonomously according to the security protection level chosen by the user for the virtual machine.The virtual machine introspection (VMI) technology was used to obtain the virtual machine information that needs to be audited.The designed encryption mechanism was used to protect the security of users selected security protection level,so as to ensure the security of user virtual machine selection audit strategy.Finally,the simulation results show that the scheme has good performance and validity.…”
    Get full text
    Article
  10. 3510

    Some Graph-Based Encryption Schemes by Baizhu Ni, Rabiha Qazi, Shafiq Ur Rehman, Ghulam Farid

    Published 2021-01-01
    “…Cryptography is a scientific technique of securing a communication from unauthenticated approach. …”
    Get full text
    Article
  11. 3511

    An adaptive intrusion detection and prevention system for Internet of Things by Sheikh Tahir Bakhsh, Saleh Alghamdi, Rayan A Alsemmeari, Syed Raheel Hassan

    Published 2019-11-01
    “…Therefore, security has become a big challenge more than before. …”
    Get full text
    Article
  12. 3512
  13. 3513

    BORDER MANAGEMENT, ARMED BANDITRY AND TERRORISM MITIGATION IN NIGERIA by ODE AGI OKO

    Published 2024-08-01
    “…This paper is set to examine key security challenges and socio-economic effects of insurgency and Armed Banditry in Nigeria; seeing that the country as a nation state is under a severe internal socio-economic and security threat. …”
    Get full text
    Article
  14. 3514

    Design of anonymous authentication protocol for RFID by DENG Miao-lei, MA Jian-feng, ZHOU Li-hua

    Published 2009-01-01
    “…Safety requirements for RFID protocols were analyzed,and a low cost anonymous authentication protocol for RFID was proposed based on the universally composable security mode.The protocol was proven secure in the standard model.The new protocol provides anonymity,mutual authentication and concurrent security,and its implementation is feasible for a wide range of RFID architectures.…”
    Get full text
    Article
  15. 3515

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  16. 3516

    Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks by Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang

    Published 2015-07-01
    “…The previous research of distributed sensor network security has focused on secure information in communication; however the research of secure data storage has been overlooked. …”
    Get full text
    Article
  17. 3517

    Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network by Jiliang Zhou, Ziqiang Lin

    Published 2021-02-01
    “…Our research on relevant literature shows that the existing authentication schemes do not fully consider the load balancing of cluster heads, while the load balancing schemes ignore the security authentication of cluster heads. Therefore, this article effectively combines load balancing and security verification, and proposes a lightweight load balancing and verification scheme (secure load and energy balancing) based on clustered wireless sensor networks. …”
    Get full text
    Article
  18. 3518

    Trusted edge computing for smart healthcare by Shaoliang PENG, Liang BAI, Li WANG, Minxia CHENG, Shulin WANG

    Published 2020-06-01
    “…With the rapid development of internet of things technology,in order to better develop modern medicine,avoid the “isolated” crisis of information,and meet the requirements of timeliness and computing performance of massive data generated by edge devices,it is a new trend of the times to combine edge computing with smart healthcare treatment.However,edge computing has a certain degree of openness,and it is prone to potential safety hazards.Therefore,people pay more and more attention to the security and privacy protection of edge computing system for smart healthcare treatment.The edge computing system and its architecture for smart healthcare were introduced,and the security risks encountered by smart healthcare in edge computing was explained,and some scholars’ solutions to the security risks were introduced.Finally,a security framework,and specific solutions for security and privacy protection under the framework were put forward,which providing some help for the trusted research of smart healthcare edge computing.…”
    Get full text
    Article
  19. 3519

    A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures by Qianxiang Zhu, Yuanqing Qin, Yue Zhao, Zhou Chunjie

    Published 2020-01-01
    “…Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. …”
    Get full text
    Article
  20. 3520

    Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method by Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang

    Published 2025-01-01
    “…Then we use the idea of iCOFB, which is originally defined with a tweakable random function, to fix the IAR-CTR mode using the tweakable block cipher, and propose the TIAR-CTR mode, which is a one-pass AEAD mode with provable security. However, the same fixed method does not work for the IAR-CFB mode.…”
    Get full text
    Article