Showing 3,621 - 3,640 results of 9,720 for search '"Securities ', query time: 0.05s Refine Results
  1. 3621

    Novel and lightweight digital signature scheme by WANG Hou-zhen1, ZHANG Huan-guo1

    Published 2010-01-01
    “…Digital signatures have many applications in information security,including authentication,data integrity and non-repudiation.However,the number theoretic-based schemes such as RSA and ECC are relatively slow in performance.These schemes do not seem to be suitable for small computing devices with limited computing capacity,such as smart cards,wireless sensor networks,and active RFID tags.Based on the hash authentication technology,a novel lightweight digital signature scheme was proposed for achieving secure and efficient signature function.Security analysis and experimental results show that it can be used as a possible alternative to the current public key cryptosystems.…”
    Get full text
    Article
  2. 3622

    Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming by Akshay Bansal, Jamie Sikora

    Published 2025-01-01
    “…In the last two decades, there has been much effort in finding secure protocols for two-party cryptographic tasks. …”
    Get full text
    Article
  3. 3623
  4. 3624

    A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks by Yanxia Chen, Zhe Li, Rongxin Zhu

    Published 2024-12-01
    “…Blockchain technology, recognized for its security, confidentiality, and traceability, is particularly suitable for scenarios requiring secure data exchange. …”
    Get full text
    Article
  5. 3625
  6. 3626
  7. 3627

    Reusable attribute-based signature with attribute revocation and authenticated key agreement by ZHANG Zhishuo, YANG Huixi, HUANG Wen, LIAO Yongjian, ZHOU Shijie

    Published 2024-04-01
    “…Ultimately, theoretical comparisons and simulation experiments conducted at a 128-bit advanced encryption standard (AES) security level demonstrated that the proposed attribute-based authentication and secure communication scheme outperforms other contemporary schemes in terms of efficiency.…”
    Get full text
    Article
  8. 3628

    Anonymous group key distribution scheme for the internet of vehicles by Zhiwang HE, Huaqun WANG

    Published 2023-10-01
    “…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
    Get full text
    Article
  9. 3629

    Designing Attack Surface in Early Childhood Education System Environment using Risk Assessment and Enterprise Architecture Approach by Dadang Setiawan, Dita Oktaria, Sidik Prabowo, Elizabeth Sastrina Indrasari

    Published 2024-11-01
    “…TOGAF is utilized to structure the enterprise architecture, aligning IT strategies with institutional goals while embedding robust security measures across the digital infrastructure. …”
    Get full text
    Article
  10. 3630

    IMPACT OF PENSION SYSTEM REFORMS ON PUBLIC FINANCE EXPENDITURES IN POLAND by Anna Owczarczyk

    Published 2019-12-01
    “…The social security system in each country, if it exists, plays a crucial role in supporting citizens and specific expenditures of the public finance system. …”
    Get full text
    Article
  11. 3631
  12. 3632

    Efficient and privacy-preserving online face authentication scheme by Ming LI, Xiaopeng YANG, Hui ZHU, Fengwei WANG, Qi LI

    Published 2020-05-01
    “…In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.…”
    Get full text
    Article
  13. 3633

    Research on the trusted environment of container cloud based on the TPCM by Guojie LIU, Jianbiao ZHANG, Ping YANG, Zheng LI

    Published 2021-08-01
    “…Container technology is a lightweight operating system virtualization technology that is widely used in cloud computing environments and is a research hotspot in the field of cloud computing.The security of container technology has attracted much attention.A method for constructing a trusted environment of container cloud using active immune trusted computing was proposed, and its security meet the requirements of network security level protection standards.First, container cloud servers were measured through the TPCM and a trust chain from the TPCM to the container's operating environment was established.Then, by adding the trusted measurement agent of the container to the TSB, the trusted measurement and trusted remote attestation of the running process of the container were realized.Finally, an experimental prototype based on Docker and Kubernetes and conduct experiments were built.The experimental results show that the proposed method can ensure the credibility of the boot process of the cloud server and the running process of the container and meet the requirements of the network security level protection standard evaluation.…”
    Get full text
    Article
  14. 3634

    Attacks on One Designated Verifier Proxy Signature Scheme by Baoyuan Kang

    Published 2012-01-01
    “…So, their scheme is not secure.…”
    Get full text
    Article
  15. 3635

    Privacy-preserving precise profile matching in mobile social network by Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao

    Published 2022-11-01
    “…Profile matching is a key feature in mobile social networking applications, where friends are recommended to requesters by comparing the similarity of attributes between them.However, users’ personal information is exposed to the risk of privacy disclosure in the process of profile matching.The existing solutions exist some issues such as inaccurate matching results or inability to meet users’ requirements for multi-dimensional privacy protection.Baesed on this, a privacy-preserving precise profile matching (P3M) scheme was proposed, which allowed users to flexibly set the matching range of attributes and distances according to their requirements.The Paillier encryption was utilized to ensure data security of users, and a secure dot product protocol was designed to achieve secure ciphertext comparison of user attributes and query ranges.The P3M realized multi-dimensional privacy-preserving of users including user feature attributes and location attributes.Finally, the correctness and security of P3M scheme were analyzed and proved in detail, and extensive experimental results verified the effectiveness and efficiency of P3M scheme.…”
    Get full text
    Article
  16. 3636

    Sécurité sanitaire sous dépendance by Marie Coris, Alain Piveteau, Philippe Gorry, Matthieu Montalban

    Published 2021-07-01
    “…Improving public health security on a sustainable basis is not simply a matter of adjusting economic variables or a few incentives, even on a large budgetary scale. …”
    Get full text
    Article
  17. 3637

    Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare by Mojca Volk, Janez Sterle, Urban Sedlar

    Published 2015-10-01
    “…The first mechanism provides secure submission of health-related observations into a hospital information system, whereas the second mechanism enables secure short-term sharing of observations without storage.…”
    Get full text
    Article
  18. 3638

    An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature by Yuanpan Zheng, Guangyu Chen, Liguan Guo

    Published 2020-01-01
    “…From the proofs of correctness and security, we know that it does not only has anonymity and traceability of the group signature scheme but also has unforgeability and forward security. …”
    Get full text
    Article
  19. 3639

    Efficient and safe auditable mixed-coin service scheme based on blind signature by Kang QIAO, Hongbo TANG, Wei YOU, Haitao LI

    Published 2020-08-01
    “…The mixed-coin service can provide solutions for the privacy problem of blockchain,but it still faces efficiency bottlenecks and security risks.To further improve the efficiency and security protection of the mixed-coin service,an efficient and safe auditable mixed-coin service scheme based on blind signature was proposed.Firstly,this scheme added audit measures.It added an audit blockchain to the traditional mix-coin model to record the behavior of users and mixers,achieving traceability and accountability.Then,this method used elliptic curves algorithm to construct blind signatures instead of blind signature schemes based on bilinear pairs or RSA.Finally,this scheme proposed an auditable blind mix-coin service agreement based on the auditable mix-coin model and the blind signature algorithm based on elliptic curve.Simulation analysis shows that the proposed scheme has six security features,such as auditability and anti-theft attack,while providing privacy protection.Under the same security intensity,the proposed scheme can effectively reduce the computational overhead and storage overhead.…”
    Get full text
    Article
  20. 3640

    Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review by Bandar Alotaibi

    Published 2025-01-01
    “…Web 3.0 relies on decentralization, which uses blockchain technology to ensure secure user communication. However, Web 3.0 still faces many security challenges that might affect its deployment and expose users’ data and digital assets to cybercriminals. …”
    Get full text
    Article