Showing 3,721 - 3,740 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3721

    Mimic cloud service architecture for cloud applications by Liming PU, Hongquan WEI, Xing LI, Yiming JIANG

    Published 2021-02-01
    “…In order to solve the problem of the lack of heterogeneity and dynamics of cloud application services with a single executor, and the difficulty of dealing with the security threats of unknown vulnerabilities and backdoors, a mimic cloud service architecture was proposed.In this architecture, the application services provided by the cloud platform were constructed into a service package based on mimic defense technology, so that the application services had the endogenous security features and robustness brought by mimic structure.At the same time, two key mimic cloud services operating mechanism,policy scheduling and adjudication mechanism were discussed.The experimental results and analysis show that the mimic cloud service obtains better security and its response time delay can be reduced by reducing the performance difference of the executor.…”
    Get full text
    Article
  2. 3722

    Identity-based puncturable signature scheme by Dongmei YANG, Yue CHEN, Jianghong WEI, Xuexian HU

    Published 2021-12-01
    “…To overcome the shortcomings of available forward-secure identity-based signature (IBS) scheme in terms of actual practicability and secret key update efficiency, the notion of identity-based puncturable signature (IBPS) scheme was proposed based on the idea of puncturable public-key encryption scheme.Specifically, the syntax and security notion of IBPS were given, and then a concrete IBPS scheme was constructed based on Bloom filter.Under the computational Diffie-Hellman assumption, the proposed scheme achieved the existential unforgeability in the random oracle model.The performance analysis and implementation results demonstrate that, compared with traditional forward-secure IBS schemes, the proposed scheme provides more practical fine-grained forward secrecy, and has higher efficiency of secret key update.…”
    Get full text
    Article
  3. 3723

    Light block cipher algorithm for electric power industry by Tao WANG

    Published 2015-12-01
    “…With the development of computer technology,cryptographic algorithms were applied more and more widely in the field of information security.However,it has been a very important problem that how to achieve high performance,high security encryption algorithm and more convenient application in the software and hardware environment.In future grid environment,study of the electric power industry special lightweight block cipher algorithm can get rid of the actual state that only using general algorithm,also makes the information and the safety of the power system more self controlled.According to the electric power industry central business security requirements,the lightweight block cipher algorithm of special power of better performance,higher safety and more convenient application were realized.…”
    Get full text
    Article
  4. 3724

    Chaos-based scramble self-embedding watermarking algorithm by HE Hong-jie, ZHANG Jia-shu

    Published 2006-01-01
    “…A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the wa- termarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effec- tively locate tamper block. …”
    Get full text
    Article
  5. 3725

    Random routing defense method based on deep deterministic policy gradient by Xiaoyu XU, Hao HU, Hongqi ZHANG, Yuling LIU

    Published 2021-06-01
    “…To solve the problem of the existing routing shuffling defenses, such as too coarse data flow splitting granularity, poor protection effect on legitimate QoS and the security against eavesdropping attacks needed to be improved, a random routing defense method based on DDPG was proposed.INT was used to monitor and obtain the network state in real time, DDPG algorithm was used to generate random routing scheme considering both security and QoS requirements, random routing scheme was implemented with programmable switch under P4 framework to realize real-time routing shuffling with packet level granularity.Experiment results show that compared with other typical routing shuffling defense methods, the security and QoS protection effect of the proposed method are improved.…”
    Get full text
    Article
  6. 3726

    Design of efficient anonymous identity authentication protocol for lightweight IoT devices by Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG

    Published 2022-07-01
    “…Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical unclonable function (PUF).Through the formal security model and ProVerif tool, it was proved that the protocol satisfies 13 security properties such as information confidentiality, integrity, un-traceability, and forward/backward secrecy.Compared with existing relevant protocols, the computing overhead of the protocol on the device side and the server side is 0.468 ms and 0.072 ms respectively, and the device storage and communication overheads are 256 bit and 896 bit respectively, which is highly suitable for lightweight IoT devices with limited resources.…”
    Get full text
    Article
  7. 3727

    Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network by Xiao-rui ZHONG, Chun-guang MA

    Published 2014-03-01
    “…Witnesses of a dynamic accumulator (DA) can ensure whether an object has been accumulated.On the basis of this,node membership in a cluster was verified and a novel authenticated group key management protocol was proposed,which supports node revocation and addition.In order to establish a group key for a cluster,each member provides their assigned number to join accumulation.DAAG can not only guarantee the confidentiality of witnesses,but also keep non-members from calculating novel group keys by binding witness with group key update.The security and performance analyses show that DAAG is resistant against replay attack,forgery attack and collusion attack,and can provide forward security and backward security.…”
    Get full text
    Article
  8. 3728

    Keeping confidentiality of sensitive attributes in credential during trust negotiation by LIAO Jun-guo1, HONG Fan2, LI Jun2, YANG Mu-xiang2

    Published 2008-01-01
    “…The scheme,called SDSA(selectively disclosing sensitive attributes),was proposed to keep confidentiality of sensitive attributes in credential,which had the following characteristics,such as selectively disclosing sensitive attributes in credential,simple key management,no need of the secure third party.The security of SDSA is proved.The application and implementation of SDSA is illuminated through a typical example.…”
    Get full text
    Article
  9. 3729
  10. 3730

    Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles by Haibo ZHANG, Kai LAN, Zhou CHEN, Ruyan WANG, Can ZOU, Mingyue WANG

    Published 2023-06-01
    “…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
    Get full text
    Article
  11. 3731

    Personal OAuth authorization server and push OAuth for Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2017-06-01
    “…However, Internet of Things security is an essential factor. OAuth is one of the most successful authentication and authorization protocols on the Internet. …”
    Get full text
    Article
  12. 3732

    Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure by Woong Go, Jin Kawk

    Published 2014-01-01
    “…Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. …”
    Get full text
    Article
  13. 3733

    NIGERIA’S INTRACTABLE CRISIS OF NATIONAL INSECURITY AND THE RESPONSE OF THE SOUTHWESTERN STATES by Sunday Owen, ABANG PhD, ADEYEMI-SUENU, Adebowale(PhD)

    Published 2022-05-01
    “…This is in the face of the Nigeria Police Force found incapable to rise up to this national security challenge. To make up for this apparent insecurity, the South-west region instituted a regional security alternative Amoteku. …”
    Get full text
    Article
  14. 3734
  15. 3735

    Verifiable attribute-based searchable encryption scheme based on blockchain by Xixi YAN, Xiaohan YUAN, Yongli TANG, Yanli CHEN

    Published 2020-02-01
    “…For the problem that the shared decryption key lacks of fine-grained access control and the search results lacks of correctness verification under one-to-many search model,a verifiable attribute-based searchable encryption scheme based on blockchain was proposed.The ciphertext policy attribute-based encryption mechanism was used on the shared key to achieve fine-grained access control.Ethereum blockchain technology was combined to solve the problem of incorrect search results returned by the semi-honest and curious cloud server model,so it could prompt both the cloud server and the user to follow the rules of the contract honestly and achieved service-payment fairness between the user and the cloud server in the pay-per-use cloud environment.In addition,based on the irreversible modification of the blockchain,the cloud server was guaranteed to receive the service fee,and the user was assured to obtain the correct retrieval results without additional verification which reduced the computational overhead of the user.The security analysis shows that the scheme satisfies the semantic security against adaptive chosen keyword attack and can protect the privacy of users and the security of data.The performance comparison and experimental results show that the scheme has certain optimizations in security index generation,search token generation,retrieval efficiency and transaction quantity,so it is more suitable for one-to-many search scenarios such as smart medical.…”
    Get full text
    Article
  16. 3736

    Using Burstiness for Network Applications Classification by Hussein Oudah, Bogdan Ghita, Taimur Bakhshi, Abdulrahman Alruban, David J. Walker

    Published 2019-01-01
    “…Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. …”
    Get full text
    Article
  17. 3737

    Device-independent uncloneable encryption by Srijita Kundu, Ernest Y.-Z. Tan

    Published 2025-01-01
    “…In particular, the resulting single-decryptor encryption scheme achieves device-independent security with respect to a standard definition of security against random plaintexts. …”
    Get full text
    Article
  18. 3738
  19. 3739

    ILLEGAL TRANSNATIONAL MIGRATION AND ILLICIT DRUG TRAFFICKING IN NIGERIA by Aondowase Targba

    Published 2023-09-01
    “…There should be retraining, re-orientation and a clean-up strategy within the Nigerian security agencies to curb corruption in the security system. …”
    Get full text
    Article
  20. 3740

    A New Image Encryption Method Using an Optimized Smart Codebook by Rami Sihwail, Dyala Ibrahim

    Published 2025-01-01
    “…The assessment of the proposed encryption method demonstrates its resilience against cryptographic attacks, affirming its security and precision. The results show an impressive improvement in securing images compared to previous related efforts.…”
    Get full text
    Article