Showing 3,641 - 3,660 results of 9,720 for search '"Securities ', query time: 0.05s Refine Results
  1. 3641

    Dynamic scheduling method of service function chain executors based on the mimic defense architecture by Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG

    Published 2022-04-01
    “…Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.…”
    Get full text
    Article
  2. 3642

    EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications by Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang

    Published 2013-11-01
    “…Compared with conventional EAP-AKA, our protocol guarantees stronger security and provides better performance. Detailed security analysis has shown that the proposed EG-AKA protocol is secure in terms of user and group identity protection and resistance to several attacks. …”
    Get full text
    Article
  3. 3643

    Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme by Yunchuan WANG, Xiaorong XU, Yingbiao YAO, Weiwei WU

    Published 2017-08-01
    “…Energy efficiency based PUEA defensive scheme was investigated with performance analysis.In this scheme,CSS energy efficiency was constructed as the optimum objective in the presence of PUEA with secure detection probability and false alarm probability threshold as the constraint conditions.Secure CSS model and PUEA defensive scheme were proposed to achieve energy efficiency based secure CSS.K-out-of-N criterion is set as global decision criterion in the scheme.Optimal fusion threshold K and optimal cooperative SUs N can be determined in secure CSS with the guarantee of energy efficiency.Compared with the traditional maximum ratio combining (MRC) fusion rule,the proposed PUEA defensive scheme not only guarantees system energy efficiency,but also improves system detection performance.Namely,the proposed scheme makes a trade-off between energy efficiency and detection performance in the presence of PUEA.The numerical simulation results show that the proposed strategy is not affected by the PUE interference power,and it has a high degree of persistence for PUEA attack.…”
    Get full text
    Article
  4. 3644

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…As a result, information security has become even more critical than before. …”
    Get full text
    Article
  5. 3645

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…Companies encounter IAM as security challenges while adopting more technologies became apparent. …”
    Get full text
    Article
  6. 3646

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…The DBDH and DDH hard problems proved the scheme’s keyword ciphertext security and trapdoor security. Experiments show the proposed scheme secures data and keys during key generation, trapdoor, and index generation, and correctness verification. …”
    Get full text
    Article
  7. 3647

    Deep learning for cyber threat detection in IoT networks: A review by Alyazia Aldhaheri, Fatima Alwahedi, Mohamed Amine Ferrag, Ammar Battah

    Published 2024-01-01
    “…While these innovations offer unprecedented opportunities, they also introduce complex security challenges. Cybersecurity is a pivotal concern for intrusion detection systems (IDS). …”
    Get full text
    Article
  8. 3648

    Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment by Sang-Soo Yeo, Dae-il Park, Young-Ae Jung

    Published 2014-01-01
    “…This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. …”
    Get full text
    Article
  9. 3649

    DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments by Min Su Song, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, Jong Hyuk Park

    Published 2014-01-01
    “…Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. …”
    Get full text
    Article
  10. 3650

    eDAAAS: Efficient distributed anonymous authentication and access in smart homes by An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos

    Published 2016-12-01
    “…Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. Moreover, the resource-constrained nature of most of the devices implies that any security mechanisms deployed should be lightweight and highly efficient. …”
    Get full text
    Article
  11. 3651

    Software defined network implementation of multi-node adaptive novel quantum key distribution protocol by Hardeer Kaur, Jai Sukh Paul Singh

    Published 2024-09-01
    “…Engineers have been working to create a better and more secure cryptographic system. Quantum key distribution stands at the top of this security system. …”
    Get full text
    Article
  12. 3652

    A general attack model based on Android system vulnerability by Xihai DENG, Weimiao FENG, Luping MA, Ying LI

    Published 2016-10-01
    “…The vulnerability exploitation technology,the security of mobile operating systems and the security of Android ecosystem have become a research focus in both industry and academia. …”
    Get full text
    Article
  13. 3653

    Fused access control scheme for sensitive data sharing by Xi-xi YAN, Tao GENG

    Published 2014-08-01
    “…In order to improve security of sensitive data sharing and distributing, fused access control scheme based on the mechanism of attribute-based encryption (ABE) and usage control (UCON) was proposed. …”
    Get full text
    Article
  14. 3654

    Research on key management and authentication protocol of PDA in smart grid by Xiao YU, Li TIAN, Zhe LIU, Jie WANG

    Published 2018-03-01
    “…According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a key management mechanism was designed which presented for the indentify of hardware and controlled by user,to guarantee the security of key management and build a safe and effective mechanism of key backup and recovery.Based on trusted hardware module,security access for PDA in smart grid was realized,with the public and private key of key management strategy and improved access authentication protocol based on public key cryptography.…”
    Get full text
    Article
  15. 3655

    Static-analysis-based event input generation approach for Android application by Yi-lin YE, Zhen-ji ZHOU, Zheng HONG, Hui-ying YAN, Li-fa WU

    Published 2017-06-01
    “…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
    Get full text
    Article
  16. 3656

    Certificateless signature scheme without random oracles by Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG

    Published 2015-04-01
    “…The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure against key replacement attack.In order to solve this problem,a new certificateless signature scheme in the standard model had constructed.Based on the NGBDH and Many-DH assumption,the scheme was proved secure against existentially unforgeable under adaptive chosen message attack.In addition,the proposed scheme enjoys less computation cost and lower communication bandwidth and can resist against key replacement attack.…”
    Get full text
    Article
  17. 3657
  18. 3658

    Health system financing fragmentation and maternal mortality transition in Mexico, 2000–2022 by Edson Serván-Mori, Carlos Pineda-Antúnez, Diego Cerecero-García, Laura Flamand, Alejandro Mohar-Betancourt, Christopher Millett, Thomas Hone, Rodrigo Moreno-Serra, Octavio Gómez-Dantés

    Published 2025-01-01
    “…Seven out of ten maternal deaths occurred in the population without social security from 2000 to 2018, then decreasing to six out of ten from 2020. …”
    Get full text
    Article
  19. 3659

    Bytecode-based approach for Ethereum smart contract classification by Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG

    Published 2022-10-01
    “…In recent years, blockchain technology has been widely used and concerned in many fields, including finance, medical care and government affairs.However, due to the immutability of smart contracts and the particularity of the operating environment, various security issues occur frequently.On the one hand, the code security problems of contract developers when writing contracts, on the other hand, there are many high-risk smart contracts in Ethereum, and ordinary users are easily attracted by the high returns provided by high-risk contracts, but they have no way to know the risks of the contracts.However, the research on smart contract security mainly focuses on code security, and there is relatively little research on the identification of contract functions.If the smart contract function can be accurately classified, it will help people better understand the behavior of smart contracts, while ensuring the ecological security of smart contracts and reducing or recovering user losses.Existing smart contract classification methods often rely on the analysis of the source code of smart contracts, but contracts released on Ethereum only mandate the deployment of bytecode, and only a very small number of contracts publish their source code.Therefore, an Ethereum smart contract classification method based on bytecode was proposed.Collect the Ethereum smart contract bytecode and the corresponding category label, and then extract the opcode frequency characteristics and control flow graph characteristics.The characteristic importance is analyzed experimentally to obtain the appropriate graph vector dimension and optimal classification model, and finally the multi-classification task of smart contract in five categories of exchange, finance, gambling, game and high risk is experimentally verified, and the F1 score of the XGBoost classifier reaches 0.913 8.Experimental results show that the algorithm can better complete the classification task of Ethereum smart contracts, and can be applied to the prediction of smart contract categories in reality.…”
    Get full text
    Article
  20. 3660

    Blockchain covert communication scheme based on the cover of normal transactions by Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG

    Published 2022-08-01
    “…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
    Get full text
    Article