Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3681
Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic
Published 2020-07-01“…To alleviate the traffic pressure on roads,reduce the appearance of road congestion,and avoid the occurrence of traffic accidents,a privacy-preserving intelligent monitoring (PPIM) scheme based on intelligent traffic was proposed in combination with the safe and k-nearest neighbor (KNN) algorithm.To ensure the security of traffic data,the data content was randomly divided into independent parts via the secure multi-party computing strategy,and the data components were stored and encrypted separately by non-colluding multi-servers.To improve the accuracy of road condition monitoring,an improved KNN traffic monitoring algorithm was proposed.By virtue of the similarity calculation of data,the correlation value to measure the degree of traffic condition relationship between roads was obtained.And it was integrated with the KNN as the weight coefficient.To speed up the processing of dense data,a series of data security computing protocols were designed,and the data security processing was realized.In addition,real traffic data were used to verify the algorithm.The results show that the improved KNN algorithm is helpful to improve the accuracy of traffic monitoring.The analysis shows that the algorithm can not only guarantee the safety of data but improve the accuracy of traffic monitoring.…”
Get full text
Article -
3682
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
3683
Model checking of trusted cryptographic module
Published 2010-01-01“…The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. …”
Get full text
Article -
3684
-
3685
A Survey on Event Tracking in Social Media Data Streams
Published 2024-03-01“…Event tracking in social networks finds various applications, such as network security and societal governance, which involves analyzing data generated by user groups on social networks in real time. …”
Get full text
Article -
3686
Socioeconomic Challenges on Algeria’s Progress toward SDG2 (Zero Hunger): Public Spending, Agriculture, and Economic Resilience
Published 2024-12-01“…Ensuring food security and promoting sustainable agriculture are critical global priorities, particularly in Algeria, a country endowed with substantial agricultural potential yet challenged by resource inefficiencies, climate variability, and a heavy reliance on food imports. …”
Get full text
Article -
3687
Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish
Published 2019-12-01“…To perform the function of the video file data security system, the legality of access to data is very important to secure so that it does not result in misuse of data access rights. …”
Get full text
Article -
3688
A bidirectional authentication protocol for mobile RFID system based on PRF
Published 2018-10-01“…In mobile RFID system,the reader and the database no longer communicate through the wired way,but communicate wirelessly,so there are also some potential safety issues.In order to ensure the safety of communication data,a mobile RFID bidirectional authentication protocol based on pseudo-random function was proposed.The protocol ensured the tripartite entities:the tag,the reader and the database,was authenticated each other,and thereby ensured the security of communication.The use of word synthesis operation to a certain extent,could be used to reduce the total amount of computation.The mobile RFID systems have more extensive using value by tripartite authentication; security analysis and performance analysis show that the proposed protocol has higher security and lower costs.…”
Get full text
Article -
3689
Construction contemplation of cloud platform for domestic password service based on quantum secret communication
Published 2018-07-01“…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
Get full text
Article -
3690
Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing
Published 2019-04-01“…In order to solve the problems of privilege sensitivity protection and the abuse of authorization by the agent when the device owner delegates authorization in IoT devices sharing environment,a trust-based delegation mechanism for controllable partial permissions was proposed with the trust access control model and the proxy signature.This mechanism generates trust values and authorization policies based on the relationship between the users,and implements controllable partial authority delegation through the proxy signature.According to the security analysis,the mechanism can meet the security attributes such as verifiability,non-repudiation,distinguishability,identifiability and non-abuse required by the permission transfer,and ensure the controllable security transfer of the device owner's permission.The problem of over authorization of an intermediary agent is effectively prevented.…”
Get full text
Article -
3691
Quantum dialogue protocol based on self-dual quantum low density parity check codes
Published 2020-08-01“…In quantum channels,particles are usually affected by noise during transmission.A quantum dialogue protocol based on self-dual quantum low density parity check codes was proposed to resist noise attacks.A combination of B construction method and U construction method was used to construct a self-dual quantum low density parity check matrix.The proposed quantum dialogue protocol can resist common external attacks,and there was no information leakage,which improved the efficiency of encoding and decoding.The security of quantum dialogue protocol was studied from the perspective of error correction.Security analysis shows that the protocol has sufficient security and can effectively resist common malicious attacks.…”
Get full text
Article -
3692
A review of population genetics and the prospects for crop improvement
Published 2023-09-01“…By using population genetics to improve crop yields, disease resistance, and other desirable traits, breeders can help ensure a sustainable and secure food supply for future generations.…”
Get full text
Article -
3693
A PKI-based multi-channel unified identity authentication method for energy information system
Published 2019-06-01“…There are problems of poor user experience,inconsistent management,and potential security risks in energy information system.It is urgent to study the issue of unified identity authentication between various electronic channels from the source to achieve unified management of multiple electronic service channels and service supervision of various electronic channels.A multi-dimensional electronic channel unified authentication method based on PKI certification was proposed for energy information system.Users could directly access each application system through the proposed method and perform fast and secure switching between application systems without multiple authentication processes.The approach provided users with the convenience and security of engaging in complex business management activities.…”
Get full text
Article -
3694
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01“…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
Get full text
Article -
3695
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01“…As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. …”
Get full text
Article -
3696
Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols
Published 2024-12-01“…Using machine learning algorithms, it is feasible to identify and address security risks in real-time. The proposed technology solves key privacy and security issues. …”
Get full text
Article -
3697
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01“…The Advanced Encryption Standard (AES) remains the benchmark for securing IoT systems while balancing low power consumption, minimal area usage, and moderate throughput with high security. …”
Get full text
Article -
3698
High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function
Published 2025-01-01“…The widespread availability of networks has significantly increased the exposure of data to security threats, necessitating robust encryption methods. …”
Get full text
Article -
3699
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
Get full text
Article -
3700
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article