Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3721
Mimic cloud service architecture for cloud applications
Published 2021-02-01“…In order to solve the problem of the lack of heterogeneity and dynamics of cloud application services with a single executor, and the difficulty of dealing with the security threats of unknown vulnerabilities and backdoors, a mimic cloud service architecture was proposed.In this architecture, the application services provided by the cloud platform were constructed into a service package based on mimic defense technology, so that the application services had the endogenous security features and robustness brought by mimic structure.At the same time, two key mimic cloud services operating mechanism,policy scheduling and adjudication mechanism were discussed.The experimental results and analysis show that the mimic cloud service obtains better security and its response time delay can be reduced by reducing the performance difference of the executor.…”
Get full text
Article -
3722
Identity-based puncturable signature scheme
Published 2021-12-01“…To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the idea of puncturable public-key encryption scheme.Specifically, the syntax and security notion of IBPS were given, and then a concrete IBPS scheme was constructed based on Bloom filter.Under the computational Diffie-Hellman assumption, the proposed scheme achieved the existential unforgeability in the random oracle model.The performance analysis and implementation results demonstrate that, compared with traditional forward-secure IBS schemes, the proposed scheme provides more practical fine-grained forward secrecy, and has higher efficiency of secret key update.…”
Get full text
Article -
3723
Light block cipher algorithm for electric power industry
Published 2015-12-01“…With the development of computer technology,cryptographic algorithms were applied more and more widely in the field of information security.However,it has been a very important problem that how to achieve high performance,high security encryption algorithm and more convenient application in the software and hardware environment.In future grid environment,study of the electric power industry special lightweight block cipher algorithm can get rid of the actual state that only using general algorithm,also makes the information and the safety of the power system more self controlled.According to the electric power industry central business security requirements,the lightweight block cipher algorithm of special power of better performance,higher safety and more convenient application were realized.…”
Get full text
Article -
3724
Chaos-based scramble self-embedding watermarking algorithm
Published 2006-01-01“…A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the wa- termarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effec- tively locate tamper block. …”
Get full text
Article -
3725
Random routing defense method based on deep deterministic policy gradient
Published 2021-06-01“…To solve the problem of the existing routing shuffling defenses, such as too coarse data flow splitting granularity, poor protection effect on legitimate QoS and the security against eavesdropping attacks needed to be improved, a random routing defense method based on DDPG was proposed.INT was used to monitor and obtain the network state in real time, DDPG algorithm was used to generate random routing scheme considering both security and QoS requirements, random routing scheme was implemented with programmable switch under P4 framework to realize real-time routing shuffling with packet level granularity.Experiment results show that compared with other typical routing shuffling defense methods, the security and QoS protection effect of the proposed method are improved.…”
Get full text
Article -
3726
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01“…Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical unclonable function (PUF).Through the formal security model and ProVerif tool, it was proved that the protocol satisfies 13 security properties such as information confidentiality, integrity, un-traceability, and forward/backward secrecy.Compared with existing relevant protocols, the computing overhead of the protocol on the device side and the server side is 0.468 ms and 0.072 ms respectively, and the device storage and communication overheads are 256 bit and 896 bit respectively, which is highly suitable for lightweight IoT devices with limited resources.…”
Get full text
Article -
3727
Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network
Published 2014-03-01“…Witnesses of a dynamic accumulator (DA) can ensure whether an object has been accumulated.On the basis of this,node membership in a cluster was verified and a novel authenticated group key management protocol was proposed,which supports node revocation and addition.In order to establish a group key for a cluster,each member provides their assigned number to join accumulation.DAAG can not only guarantee the confidentiality of witnesses,but also keep non-members from calculating novel group keys by binding witness with group key update.The security and performance analyses show that DAAG is resistant against replay attack,forgery attack and collusion attack,and can provide forward security and backward security.…”
Get full text
Article -
3728
Keeping confidentiality of sensitive attributes in credential during trust negotiation
Published 2008-01-01“…The scheme,called SDSA(selectively disclosing sensitive attributes),was proposed to keep confidentiality of sensitive attributes in credential,which had the following characteristics,such as selectively disclosing sensitive attributes in credential,simple key management,no need of the secure third party.The security of SDSA is proved.The application and implementation of SDSA is illuminated through a typical example.…”
Get full text
Article -
3729
The Relationship Between Emotional and Other Factors in Information Diffusion
Published 2025-01-01Get full text
Article -
3730
Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
Published 2023-06-01“…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
Get full text
Article -
3731
Personal OAuth authorization server and push OAuth for Internet of Things
Published 2017-06-01“…However, Internet of Things security is an essential factor. OAuth is one of the most successful authentication and authorization protocols on the Internet. …”
Get full text
Article -
3732
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure
Published 2014-01-01“…Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. …”
Get full text
Article -
3733
NIGERIA’S INTRACTABLE CRISIS OF NATIONAL INSECURITY AND THE RESPONSE OF THE SOUTHWESTERN STATES
Published 2022-05-01“…This is in the face of the Nigeria Police Force found incapable to rise up to this national security challenge. To make up for this apparent insecurity, the South-west region instituted a regional security alternative Amoteku. …”
Get full text
Article -
3734
-
3735
Verifiable attribute-based searchable encryption scheme based on blockchain
Published 2020-02-01“…For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was proposed.The ciphertext policy attribute-based encryption mechanism was used on the shared key to achieve fine-grained access control.Ethereum blockchain technology was combined to solve the problem of incorrect search results returned by the semi-honest and curious cloud server model,so it could prompt both the cloud server and the user to follow the rules of the contract honestly and achieved service-payment fairness between the user and the cloud server in the pay-per-use cloud environment.In addition,based on the irreversible modification of the blockchain,the cloud server was guaranteed to receive the service fee,and the user was assured to obtain the correct retrieval results without additional verification which reduced the computational overhead of the user.The security analysis shows that the scheme satisfies the semantic security against adaptive chosen keyword attack and can protect the privacy of users and the security of data.The performance comparison and experimental results show that the scheme has certain optimizations in security index generation,search token generation,retrieval efficiency and transaction quantity,so it is more suitable for one-to-many search scenarios such as smart medical.…”
Get full text
Article -
3736
Using Burstiness for Network Applications Classification
Published 2019-01-01“…Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. …”
Get full text
Article -
3737
Device-independent uncloneable encryption
Published 2025-01-01“…In particular, the resulting single-decryptor encryption scheme achieves device-independent security with respect to a standard definition of security against random plaintexts. …”
Get full text
Article -
3738
-
3739
ILLEGAL TRANSNATIONAL MIGRATION AND ILLICIT DRUG TRAFFICKING IN NIGERIA
Published 2023-09-01“…There should be retraining, re-orientation and a clean-up strategy within the Nigerian security agencies to curb corruption in the security system. …”
Get full text
Article -
3740
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01“…The assessment of the proposed encryption method demonstrates its resilience against cryptographic attacks, affirming its security and precision. The results show an impressive improvement in securing images compared to previous related efforts.…”
Get full text
Article