Showing 3,701 - 3,720 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 3701

    Two Endotracheal Tubes in One Trachea with a Traumatic Injury by Andrew Winegarner, Harish Lecamwasam, Mark C. Kendall, Shyamal Asher

    Published 2021-01-01
    “…We describe here the use of two endotracheal tubes simultaneously in the trachea to facilitate securing an airway which has been severely compromised by a self-inflicted wound to the trachea. …”
    Get full text
    Article
  2. 3702
  3. 3703

    Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication by Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi

    Published 2024-12-01
    “…Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. …”
    Get full text
    Article
  4. 3704

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
    Get full text
    Article
  5. 3705
  6. 3706

    Strategy of container migration and honeypot deployment based on signal game in cloud environment by Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU

    Published 2022-06-01
    “…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
    Get full text
    Article
  7. 3707

    Global randomized consensus algorithm resist collusion attack based on game theory by Bao ZHANG, Youliang TIAN, Sheng GAO

    Published 2022-08-01
    “…As the cornerstone of blockchain technology, consensus technology has received more attention with the continuous development of blockchain technology.The development of consensus technology has become more and more rapid, but there are still related problems.Nowadays, fault-tolerant consensus algorithms, as one of the representative blockchain consensus technologies, still have many problems to be studied.The problem of node randomness and node collusion attacks in fault-tolerant consensus algorithms had been studied, and a game-theoretic-based anti-corruption algorithm was proposed.The global randomization consensus algorithm of collusion attack improved the security and throughput of the blockchain network by realizing the randomization of nodes and solving related security problems.In the process of selecting nodes participating in the fault-tolerant consensus algorithm, the global randomization of the initiator and verifier nodes was realized by using the mapping function and the weighted random function, thereby ensuring the identity anonymity of the initiator and verifier nodes and improving the blockchain network security accordingly.The reputation update model was used to realize the dynamic update of the reputation, and the game theory was used to analyze the security problems of the fault-tolerant consensus algorithm.A more correct and efficient algorithm model was constructed to improve the throughput of the algorithm and analyze the problem of collusion attack of more than one third of the nodes in this kind of algorithm, the refined Bayesian game was used to construct a collusion contract and analyze the collusion The Nash equilibrium point between the two nodes was adopted to solve the collusion attack problem of more than one third of the nodes.The security analysis and experiments show that the global randomization consensus algorithm based on the game theory anti-collusion attack is better than PoW、PoS and PBFT.The consensus algorithm is not only effective to improve throughput and reduce computing resource consumption, but also resistant to DDoS, Eclipse attacks and collusion attacks by more than one third of nodes.…”
    Get full text
    Article
  8. 3708
  9. 3709
  10. 3710
  11. 3711
  12. 3712

    Through attraction to the deterrence: Issues and possibilities of the Western Balkan countries by Subotić Milovan

    Published 2023-01-01
    “…The inevitable security paradigm shift is the special focus of socalled small states and regions with multitude if fundamental cultural and general identity features that are represented as insurmountable. …”
    Get full text
    Article
  13. 3713
  14. 3714
  15. 3715

    Optimization of Structure and Size for Diaphragm Profile by Cao Angang, Chang Shan, Ding Chunhua, Li Shuo

    Published 2017-01-01
    “…Taking the common diaphragm with the conical profile as example,the distribution of stress and security coefficient in profile are analyzed by ANSYS software. …”
    Get full text
    Article
  16. 3716
  17. 3717

    High-dimensional coherent one-way quantum key distribution by Kfir Sulimany, Guy Pelc, Rom Dudkiewicz, Simcha Korenblit, Hagai S. Eisenberg, Yaron Bromberg, Michael Ben-Or

    Published 2025-01-01
    “…Abstract High-dimensional quantum key distribution (QKD) offers secure communication with key rates that surpass those of QKD protocols utilizing two-dimensional encoding. …”
    Get full text
    Article
  18. 3718

    Attribute-based revocable collaborative access control scheme by Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU

    Published 2021-05-01
    “…To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group-based attribute group were changed to reflect the update of rights, and further, an efficient re-encryption algorithm was used to realize the immediate revocation of attributes and users.The translation value was used to achieve the revocation of collaborative policy by update corresponding ciphertext.The security analysis shows the scheme can guarantee data confidentiality, forward/backward security, and resist collusion attack under chosen plaintext attack.Compared with the related works, the proposal achieved more complete and efficient revocation scheme.…”
    Get full text
    Article
  19. 3719

    Identity authentication scheme based on identity-based encryption by Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI

    Published 2016-06-01
    “…In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.…”
    Get full text
    Article
  20. 3720

    Cryptanalysis and improvement of several certificateless digital signature schemes by WANG Hua-qun1, XU Ming-hai2, GUO Xian-jiu1

    Published 2008-01-01
    “…The improved digital signature schemes are provably secure.…”
    Get full text
    Article