Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3541
Privacy enhancement using selective encryption scheme in data outsourcing
Published 2016-07-01“…In this article, we introduce a practical scheme that dynamically secures and outsources data on demand as well as propose a corresponding architecture to securely process data in database service provider. …”
Get full text
Article -
3542
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01“…We formally analyzed the security of our protocol and results showed that the protocol is secure if the Computational Diffie-Hellman (CDH) problem is intractable. …”
Get full text
Article -
3543
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01“…The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.…”
Get full text
Article -
3544
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…Then a new certificateless aggregate signature scheme with constant pairing computations based on the new certificateless signature scheme is presented. Security analysis shows that the proposed certificateless aggregate signature scheme is provably secured in the random oracle.…”
Get full text
Article -
3545
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
Get full text
Article -
3546
Data popularity-based encrypted deduplication scheme without third-party servers
Published 2022-08-01“…It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recording data popularity, while the third party is prone to a single point of failure and efficiency bottleneck.To address this problem, a popularity-based encrypted deduplication scheme without third-party servers was proposed, which accurately recorded the data popularity based on the Count-Min sketch algorithm and Merkle Puzzles protocol, and achieved encrypted deduplication of unpopular data through the sPAKE protocols performed among users.Security analysis and experimental evaluation show that the proposed scheme is secure and efficient.…”
Get full text
Article -
3547
Study of cross-domain identity authentication in SOA environment
Published 2016-11-01“…For the network nowadays becoming more and more complex,the SOA environment has the properties of heterogeneous and multiple domain.A trust management scheme was proposed based on the fuzzy theory,and a cross-domain identity authentication in SOA was constructed by the combining of the trust management scheme with the credential transform service.During the authentication,a user’domain used the trust management scheme to guarantee its security,and the service provider’s domain used both the trust management and credential to ensure its security.Furthermore,the credential transform made users can access services in the domains whose security mechanism was different from the users’.It is shown that the proposed authentication scheme has superiority in both security and pervasive,and is suitable for the SOA environment.…”
Get full text
Article -
3548
-
3549
Consistency of group key exchange protocols
Published 2008-01-01“…The consistency is a basic security requirement,but it is much trickier and many times overlooked. …”
Get full text
Article -
3550
-
3551
Quem tem medo de quem nas cidades de hoje? Políticas de segurança pública em tempos neoliberais
Published 2017-12-01“…These text updates reflections about the frame of private strategies of security against the violence in the city of Rio de Janeiro, having like underpinning the new neoliberal processes of capitalist acumulation Which has redesingning the carioca paisage. …”
Get full text
Article -
3552
-
3553
Modification of Fe3O4 magnetic nanoparticles for antibiotic detection
Published 2025-02-01Get full text
Article -
3554
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01“…The mechanism dynamically updates whitelists and selectively filters network traffic, ensuring a balance between security and performance. Experimental results validate its effectiveness in mitigating key threats while maintaining operational efficiency.…”
Get full text
Article -
3555
Research on Access and Handover Authentication Mechanism of SpaceIntegrated-Ground Information Network for Multi-Type Terminals
Published 2021-09-01“…With the maturity of the key technologies of the new spectrum of the network, the network can accommodate users of various frequency bands.In order to make eff ective use of resources, diff erentiated terminals need targeted and customized security protection mechanisms.In the unifi ed network architecture, three access authentication mechanisms were proposed for common terminals, high-speed terminals and Ka terminals.At the same time, in order to ensured that diff erent types of terminals could still obtain continuous network services after accessing the network, a switching authentication mechanism based on pre-switching was proposed to provided unifi ed security switching services for the three types of terminals.Formal verifi cation tool named Scyther and informal security analysis results showed that the proposed scheme meet a variety of security requirements of the proposed scenario.At the same time, compared with the same type schemes, the proposed scheme can achieve the eff ective balance between security and performance, which can meet multidimensional integration of heaven and earth network of the scene terminal access switch and certifi cation requirements.…”
Get full text
Article -
3556
Authentication method in SWIM based on improved Diameter/EAP-MD5
Published 2014-08-01“…Experi-ments on the security of SWIM authentication service based on Diameter are performed in SWIM simulation environ-ment, results show that the improved Diameter/EAP-MD5 authentication method can enhance the security of SWIM au-thentication and guarantee SWIM security service.…”
Get full text
Article -
3557
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01“…Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key escrow,but also realize batch validation and the signer’s privacy protection.A security analysis for a certificateless aggregate signature scheme with universal designated verifier was firstly provided,and two attack methods to demonstrate that their scheme was forgeable was presented.To enhance security,a new certificateless aggregate signature scheme with universal designated verifier was proposed,and then the security of the scheme in the random oracle model was proved.The performance of our proposed scheme was finally evaluated.Compared with the original scheme,the pvoposed scheme fixes the security flaws and the total computational cost is greatly reduced.…”
Get full text
Article -
3558
Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment
Published 2024-12-01“…Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. …”
Get full text
Article -
3559
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01“…To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID-MPDP were given.Then, the specific ID-MPDP scheme was designed by using RSA.Finally, the performance analysis and security analysis of ID-MPDP were given.Through performance analysis and security analysis, ID-MPDP was provably secure, efficient and convertible.It has the following advantages, such as it can be used for the integrity checking for multi-source IoT terminal data, it has lower block expansion rate, it eliminates the certification management cost by using the identity-based public key cryptography and it is convertible.…”
Get full text
Article -
3560
Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems
Published 2014-01-01“…Augmentation in communication and coding technology has made encryption an integral part of secure multimedia communication systems. Security solution for end-to-end image transmission requires content adaptation at intermediate nodes, which consumes significant resources to decrypt, process, and reencrypt the secured data. …”
Get full text
Article