Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3521
Code-based generalized signcryption scheme with multi-receiver
Published 2020-01-01“…In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was designed.Combined with the CFS signature scheme,the multi-receiver signcryption and generalized signcryption scheme based on code were designed.The security analysis shows that the multi-receiver generalized signcryption scheme can meet the security of IND-CCA2 in terms of confidentiality and can meet EUF-CMA security in terms of unforgeability.Compared with other similar multi-receiver signcryption schemes,the proposed scheme does not include exponential,bilinear pairing operations,etc.…”
Get full text
Article -
3522
Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain
Published 2020-08-01“…Considering that it was difficult to share medical record data among different medical institutions in cloud storage,an electronic medical record data sharing scheme based on searchable encryption on blockchain was proposed.In order to realize the secure storage and sharing of electronic medical records in the scheme,the patient’s electronic medical record ciphertext was stored in the hospital server,the ciphertext hash value was stored in the private blockchain,and the keyword index was stored in the consortium blockchain.Searchable encryption was used to implement secure search of keywords in the consortium blockchain,and proxy re-encryption technology was used to realize the sharing of electronic medical records of patients by other data users.Security analysis shows that the proposed scheme can achieve ciphertext security and keyword security.Moreover,the performance of the scheme was analyzed by function analysis,computational efficiency analysis and numerical simulation.The performance analysis shows that the scheme can achieve high computational efficiency.…”
Get full text
Article -
3523
Research on Communication Technology Standard Development and Control Policy Under International Standard Competition
Published 2014-05-01“…On the basis of economic interests and national security, the national economic security interests were put forward. …”
Get full text
Article -
3524
Dream of European Army: Is It a Feasible Objective or Not?
Published 2023-10-01“…We have witnessed new security and military efforts from the EU in the first two decades of the 2000s, such as the European Security Strategy, EU’s Global Strategy and Security Compass. 2013 marked a turning point when the USA deployed its new nuclear weapons in Europe. …”
Get full text
Article -
3525
Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model
Published 2014-01-01“…Lattice-based ring signature schemes offer lower computational overhead and security from quantum attacks. In this paper, we offer a lattice-based scheme. …”
Get full text
Article -
3526
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01“…In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.…”
Get full text
Article -
3527
Design and Research of S-Box Based on Dynamic Strategy
Published 2015-11-01“…Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the entire cipher algorithm.In order to improve the secure strength of the block cipher algorithm with the limited resource,a lot researches on it and analyses of S-box structure design had been done,then the design scheme of dynamic S-box which can improve the security of S-layer by learning from the architecture of Feistel and the reconstruction of S-box came out.The result of the test showed that the project really can work on the increasing of security.…”
Get full text
Article -
3528
Key infection and its applications in sensor networks
Published 2009-01-01“…Key management has remained a challenging issue in sensor networks due to the constraints of sensor node resources.First,a probabilistic model to analyze the security of key infection was derived.Then a group based key infection to further improve its security performance was proposed.Finally,by combining the key infection with a lightweight key pre-distribution mechanism,a more secure key distribution scheme for sensor networks,Group based Key Infection with Key Pre-distribution,was presented.Analysis results show that proposed scheme presents a viable trade-off between security and resource consumption for smart dust sensor networks.…”
Get full text
Article -
3529
-
3530
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01“…Abstract The data collection processes of IoT devices face significant security challenges, including access authorization, secure transmission, and secure storage. …”
Get full text
Article -
3531
Experimental Study and Theoretical Verification of Explosion-Proof Performance of Insulated Glass
Published 2020-01-01Get full text
Article -
3532
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01“…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
Get full text
Article -
3533
Increasing the cyber resilience of SMEs through open-source solutions and international collaboration
Published 2025-01-01“…Open-source solutions offer financial accessibility, flexibility, and increased security, supported by global communities that contribute to their continuous improvement. …”
Get full text
Article -
3534
Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine
Published 2018-12-01“…Generic object of a crime under the Art. 330 of the Criminal Code of Ukraine, has been defined as social relations existing with regard to the security of state secrets and official information gathered in the course of operative and search, counter-intelligence activities, in the field of the country defense, as well as the security of the state border of Ukraine and military security in terms of providing draft call and mobilization. …”
Get full text
Article -
3535
-
3536
A Proposed Chaotic-Switched Turbo Coding Design and Its Application for Half-Duplex Relay Channel
Published 2015-01-01“…Both reliability and security are two important subjects in modern digital communications, each with a variety of subdisciplines. …”
Get full text
Article -
3537
Contribution of the concept of total defence to state's resilience in emergency situations
Published 2024-01-01“…Contemporary challenges, risks and threats to the security of the Republic of Serbia, as well as the global security situation, demand reestablishment of an efficient system of national security. …”
Get full text
Article -
3538
Identity-based efficient authentication and key agreement protocol for mobile Internet
Published 2017-08-01“…For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH difficu1t prob1em on the additive group of e11iptic curve.Meanwhi1e,the security of the new protoco1 was proved under the random orac1e mode1.The ana1ysis shows that the new protoco1 meets security properties such as known session key security,perfect forward security,ephemera1 secret 1eakage resistance and the session key escrow resistance.The proposed protoco1 has the good computationa1 overhead for it was ab1e to comp1ete the mutua1 authentication and session key agreement between parties under on1y 5 times sca1ar mu1tip1ication.…”
Get full text
Article -
3539
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
Get full text
Article -
3540
Chaos-based encryption and message authentication algorithm for wireless sensor network
Published 2013-05-01“…As for the traditional digital chaos-based scheme being not directly applicable for WSN because some sensor node does not support the float type of computation,integer chaotic maps and its block encryption schemes are firstly in-troduced,and then a novel chaos-based message authentication code (MAC) scheme was proposed,which was length changeable with high-level hybrid chaotic security.At last,a security application solution for data communication on WSN employing the proposed chaos-based schemes is presented,and the performance evaluation on the real-world Mica2 node is analyzed to show that the new security solution is more applicable for WSN than the current most popular security scheme,TinySec.…”
Get full text
Article