Showing 3,601 - 3,620 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3601
  2. 3602
  3. 3603

    Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network by Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang

    Published 2013-05-01
    “…Usually multiple nodes located in different regions provide data with different security levels, and it is critical to ensure the security of the information flow in the composite services. …”
    Get full text
    Article
  4. 3604

    An Efficient Biometric Authentication Protocol for Wireless Sensor Networks by Ohood Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan

    Published 2013-05-01
    “…Wireless sensor networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. …”
    Get full text
    Article
  5. 3605

    AVRUPA BİRLİĞİ ve IRAK KRİZİ : BÖLÜNMEDEN YENİDEN BİRLEŞMEYE UZUN, İNCE BİR YOL by Sevilay Kahraman

    Published 2003-01-01
    “…The aim of this article is to assess the implications of the recent Iraqi crisis for American-European relations, the European Union's evolving Common Foreign and Security Policy/ European Security and Defence Policy and the future prospects for global governance. …”
    Get full text
    Article
  6. 3606

    AMTD:a way of adaptive moving target defense by Danjun LIU, Guilin CAI, Baosheng WANG

    Published 2018-01-01
    “…Moving target defense is a new way to change the asymmetry state between attack and defense,by dynamically moving target’s attacking surface.Frequency conversion of MTD is of great importance for the weighing between usability,security and defense cost.Nowadays,however,frequency conversion is usually determined by manager’s experience,which cannot create a balance between usability and security cost for the lack of theory basis.An adaptive moving target defense framework(AMTD)was proposed.AMTD can maximize system security at the lowest cost while ensuring that the system is available.The adaptability of AMTD has two modes.Firstly,the defense mode,it contains an adaptive conversion strategy to provide reacting defense triggered by security alerts and active defense triggered by timer expiration events.The other mode is the frequency conversion,which obtain the optimal conversion frequency by establishing mathematical models.Four series of simulation experiments were taken to verify the effectiveness of the solution.…”
    Get full text
    Article
  7. 3607

    Network slicing deployment method based on isolation level by Qirun PAN, Kaizhi HUANG, Wei YOU

    Published 2020-04-01
    “…In order to balance the performance isolation requirements and security isolation requirements of network slicing,a network slice deployment method based on isolation level was proposed.The method first determined the isolation level of the network slice instance from the aspects of performance isolation and security isolation.When deploying the virtual nodes in the appropriate location,not only ensured that all network slice instances could reach their respective performance levels and security levels,but also isolated them.The gradation difference started to limit the coexistence condition of the virtual node.Then the integer linear programming method was used to model the problem,and the deployment cost was minimized as the objective function.Finally,the particle swarm optimization algorithm based on genetic algorithm was used to find the final deployment result.The simulation results show that the method has lower deployment cost and higher benefit-to-cost ratio,and can guarantee both performance and security.…”
    Get full text
    Article
  8. 3608

    Intelligent terminal device identification method of internet of things by Qingwang XIAO, Jinhua WANG, Yixiang ZHU

    Published 2017-02-01
    “…The correct identification of the terminal of the internet of things is an important prerequisite to establish a secure connection of the internet of things.The identification of the intelligent terminal is particularly important.The device identification method of intelligent terminals in internet of things under the existing technology was investigated.From the perspective of the security of the internet of things,the security problem that the device identification method was too simple to be easily falsified of the existing scheme was analyzed.Combining the achievements of project research in the field of internet of things and the experience of the industry,the identification method of multidimensional device feature information of IoT intelligent terminals was proposed.…”
    Get full text
    Article
  9. 3609

    Bitcoin blockchain based information convert transmission by Tao ZHANG, Qianhong WU, Zongxun TANG

    Published 2021-02-01
    “…To meet efficient, safe, covert and stable transmission of confidential information, the transaction data structures, location and capacity of potential convert channels were analyzed.Then a formal security model of covert transmission in the bitcoin blockchain environment was proposed, which would not break the transaction structures, add special transaction content, can overcome shortcomings of traditional convert channels and protect the anonymity of both sender and receiver.The proposed security model opens a promising avenue of covert transmission, which is of great significance to promote the secure transmission technologies for the national special applications.…”
    Get full text
    Article
  10. 3610

    Mobile RFID system authentication protocol based on one-way pseudo random function by Biyuan JIAN, Daowei LIU

    Published 2017-06-01
    “…Aiming at the cost,efficiency and security of mobile RFID system authentication,a mobile RFID authentication protocol based on one-way pseudo random function was designed.The protocol reduced system cost by making full use of the three party of the shared key and communication information to encrypt transmission and authentication.Through the implementation of three party authentication and key update work,the agreement suffered counterfeit,desynchronization and other attacks was avoided.Finally,the logical proof of GNY and its security and performance analysis were gived to show the feasibility and security of the new protocol.…”
    Get full text
    Article
  11. 3611

    Efficiency identity-based threshold group signature scheme by LIU Hong-wei 1, 2, XIE Wei-xin 2, YU Jian-ping 2

    Published 2009-01-01
    “…Threshold group signature was used to guarantee the security of the collective decision.To improve the efficiency,a new identity-based cryptography threshold group signature scheme was proposed basing on bilinear pairing and secret sharing.In this scheme,the master key was distributed into the whole group and the user’s signature key was stored in a threshold way,these methods ensured the whole security of signature systems.The scheme with a identity-based t-out-of-n secret sharing algorithm was highly-efficient.The careful analysis and the comparison of computational efficiency show that this scheme is secure and efficient.…”
    Get full text
    Article
  12. 3612

    Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity by Ali Salem Ali, Suray Alsamaraee, Aya Ayad Hussein

    Published 2024-01-01
    “…To secure the massive amounts of secret messages, the integrity and confidentiality challenges must be addressed. …”
    Get full text
    Article
  13. 3613

    Machine Learning-Based Network Detection Research for SDNs by Lai Jiayue

    Published 2025-01-01
    “…This research endeavors to fortify the security posture of Software-Defined Networks (SDN) through the strategic utilization of intelligent machine learning techniques, with a primary focus on mitigating detrimental Denial of Service (DoS) attacks. …”
    Get full text
    Article
  14. 3614

    A Trusted Federated Learning Method Based on Consortium Blockchain by Xiaojun Yin, Xijun Wu, Xinming Zhang

    Published 2024-12-01
    “…However, traditional FL methods face challenges in ensuring trust, security, and efficiency, particularly in heterogeneous environments with varying computational capacities. …”
    Get full text
    Article
  15. 3615
  16. 3616

    Transforming Alliances: A 20-Year Overview of Singapore-US Relations under Lee Hsien Loong by TRUONG HUE

    Published 2025-01-01
    “…It also examines how both countries have expanded their cooperation into non-traditional security areas such as counterterrorism, cybersecurity, and environmental security, adapting to the evolving global security environment. …”
    Get full text
    Article
  17. 3617

    Exploring Age and Gender Differences in ICT Cybersecurity Behaviour by Dawn Branley-Bell, Lynne Coventry, Matt Dixon, Adam Joinson, Pam Briggs

    Published 2022-01-01
    “…Older users appear less likely to secure their devices compared to younger users; however, the reverse was found for the other behaviours, with older users appearing more likely to generate secure passwords and show proactive risk awareness and regularly install updates. …”
    Get full text
    Article
  18. 3618

    Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network by Shun ZHANG, Hongli FAN, Hong ZHONG, Miaomiao TIAN

    Published 2018-04-01
    “…To ensure the security and privacy of patients’ health data in wireless body area network (WBAN),communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side,a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity,mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes,the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced,which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.…”
    Get full text
    Article
  19. 3619

    Cryptanalysis of hyperchaotic S-box generation and image encryption by Mohammad Mazyad Hazzazi, Gulraiz, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai

    Published 2024-12-01
    “…The structure and properties of S-boxes have a significant impact on the overall security of cryptographic systems. This article aims to improve cryptographic security through unique S-box construction methodologies. …”
    Get full text
    Article
  20. 3620

    Is the Financing of German Health and Long-Term Care Insurance Sustainable? by Friedrich Breyer, Normann Lorenz

    Published 2020-08-01
    “…Thus the sustainability of the German social security system is severely jeopardised.…”
    Get full text
    Article