Showing 3,521 - 3,540 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3521

    Code-based generalized signcryption scheme with multi-receiver by Yiliang HAN, Zhong WANG

    Published 2020-01-01
    “…In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was designed.Combined with the CFS signature scheme,the multi-receiver signcryption and generalized signcryption scheme based on code were designed.The security analysis shows that the multi-receiver generalized signcryption scheme can meet the security of IND-CCA2 in terms of confidentiality and can meet EUF-CMA security in terms of unforgeability.Compared with other similar multi-receiver signcryption schemes,the proposed scheme does not include exponential,bilinear pairing operations,etc.…”
    Get full text
    Article
  2. 3522

    Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain by Shufen NIU, Wenke LIU, Lixia CHEN, Caifen WANG, Xiaoni DU

    Published 2020-08-01
    “…Considering that it was difficult to share medical record data among different medical institutions in cloud storage,an electronic medical record data sharing scheme based on searchable encryption on blockchain was proposed.In order to realize the secure storage and sharing of electronic medical records in the scheme,the patient’s electronic medical record ciphertext was stored in the hospital server,the ciphertext hash value was stored in the private blockchain,and the keyword index was stored in the consortium blockchain.Searchable encryption was used to implement secure search of keywords in the consortium blockchain,and proxy re-encryption technology was used to realize the sharing of electronic medical records of patients by other data users.Security analysis shows that the proposed scheme can achieve ciphertext security and keyword security.Moreover,the performance of the scheme was analyzed by function analysis,computational efficiency analysis and numerical simulation.The performance analysis shows that the scheme can achieve high computational efficiency.…”
    Get full text
    Article
  3. 3523

    Research on Communication Technology Standard Development and Control Policy Under International Standard Competition by Chaofeng Xu, Zhanhong Xin

    Published 2014-05-01
    “…On the basis of economic interests and national security, the national economic security interests were put forward. …”
    Get full text
    Article
  4. 3524

    Dream of European Army: Is It a Feasible Objective or Not? by Sevil Şahin, Mustafa Ozan Şahin

    Published 2023-10-01
    “…We have witnessed new security and military efforts from the EU in the first two decades of the 2000s, such as the European Security Strategy, EU’s Global Strategy and Security Compass. 2013 marked a turning point when the USA deployed its new nuclear weapons in Europe. …”
    Get full text
    Article
  5. 3525

    Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model by Geontae Noh, Ji Young Chun, Ik Rae Jeong

    Published 2014-01-01
    “…Lattice-based ring signature schemes offer lower computational overhead and security from quantum attacks. In this paper, we offer a lattice-based scheme. …”
    Get full text
    Article
  6. 3526

    Trusted access scheme for intranet mobile terminal based on encrypted SD card by Jiyang LI, Pengyuan ZHAO, Zhe LIU

    Published 2019-08-01
    “…In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.…”
    Get full text
    Article
  7. 3527

    Design and Research of S-Box Based on Dynamic Strategy by Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong, Zhulin An

    Published 2015-11-01
    “…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
    Get full text
    Article
  8. 3528

    Key infection and its applications in sensor networks by LIU Zhi-hong1, MA Jian-feng1, PANG Liao-jun1, PEI Qing-qi1

    Published 2009-01-01
    “…Key management has remained a challenging issue in sensor networks due to the constraints of sensor node resources.First,a probabilistic model to analyze the security of key infection was derived.Then a group based key infection to further improve its security performance was proposed.Finally,by combining the key infection with a lightweight key pre-distribution mechanism,a more secure key distribution scheme for sensor networks,Group based Key Infection with Key Pre-distribution,was presented.Analysis results show that proposed scheme presents a viable trade-off between security and resource consumption for smart dust sensor networks.…”
    Get full text
    Article
  9. 3529
  10. 3530

    Decentralized identifiers based IoT data trusted collection by Baitao Zhang, Rui Shi, Xiaolin Li, Mengjiao Zhang

    Published 2025-02-01
    “…Abstract The data collection processes of IoT devices face significant security challenges, including access authorization, secure transmission, and secure storage. …”
    Get full text
    Article
  11. 3531
  12. 3532

    Analysis and improvement on identity-based cloud data integrity verification scheme by Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, Fu XIAO, Ruchuan WANG

    Published 2018-11-01
    “…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
    Get full text
    Article
  13. 3533

    Increasing the cyber resilience of SMEs through open-source solutions and international collaboration by Ionica ȘERBAN, Florentina-Mihaela CURCĂ, Robert-Ștefan ȘANDRU

    Published 2025-01-01
    “…Open-source solutions offer financial accessibility, flexibility, and increased security, supported by global communities that contribute to their continuous improvement. …”
    Get full text
    Article
  14. 3534

    Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2018-12-01
    “…Generic object of a crime under the Art. 330 of the Criminal Code of Ukraine, has been defined as social relations existing with regard to the security of state secrets and official information gathered in the course of operative and search, counter-intelligence activities, in the field of the country defense, as well as the security of the state border of Ukraine and military security in terms of providing draft call and mobilization. …”
    Get full text
    Article
  15. 3535
  16. 3536

    A Proposed Chaotic-Switched Turbo Coding Design and Its Application for Half-Duplex Relay Channel by Tamer H. M. Soliman, Fengfan Yang, S. Ejaz

    Published 2015-01-01
    “…Both reliability and security are two important subjects in modern digital communications, each with a variety of subdisciplines. …”
    Get full text
    Article
  17. 3537

    Contribution of the concept of total defence to state's resilience in emergency situations by Banjac Nikola

    Published 2024-01-01
    “…Contemporary challenges, risks and threats to the security of the Republic of Serbia, as well as the global security situation, demand reestablishment of an efficient system of national security. …”
    Get full text
    Article
  18. 3538

    Identity-based efficient authentication and key agreement protocol for mobile Internet by Zhen WANG, Zhao-feng MA, Shou-shan LUO

    Published 2017-08-01
    “…For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH difficu1t prob1em on the additive group of e11iptic curve.Meanwhi1e,the security of the new protoco1 was proved under the random orac1e mode1.The ana1ysis shows that the new protoco1 meets security properties such as known session key security,perfect forward security,ephemera1 secret 1eakage resistance and the session key escrow resistance.The proposed protoco1 has the good computationa1 overhead for it was ab1e to comp1ete the mutua1 authentication and session key agreement between parties under on1y 5 times sca1ar mu1tip1ication.…”
    Get full text
    Article
  19. 3539

    Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications by Preethi Preethi, Mohammed Mujeer Ulla, G. Praveen Kumar Yadav, Kumar Sekhar Roy, Ruhul Amin Hazarika, Kuldeep Saxena K.

    Published 2024-01-01
    “…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
    Get full text
    Article
  20. 3540

    Chaos-based encryption and message authentication algorithm for wireless sensor network by Tie-ming CHEN, Liang GE

    Published 2013-05-01
    “…As for the traditional digital chaos-based scheme being not directly applicable for WSN because some sensor node does not support the float type of computation,integer chaotic maps and its block encryption schemes are firstly in-troduced,and then a novel chaos-based message authentication code (MAC) scheme was proposed,which was length changeable with high-level hybrid chaotic security.At last,a security application solution for data communication on WSN employing the proposed chaos-based schemes is presented,and the performance evaluation on the real-world Mica2 node is analyzed to show that the new security solution is more applicable for WSN than the current most popular security scheme,TinySec.…”
    Get full text
    Article