Showing 3,741 - 3,760 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3741

    Large-scale measurement and analysis on misconfigurations of DNSSEC from recursive side by LIU Linhui, TU Feifan, CHEN Yong, ZUO Peng, LIU Dongjie, ZHANG Yinyan, GENG Guanggang

    Published 2024-10-01
    “…Domain name system security extensions (DNSSEC) was a secure extension protocol for the domain name system (DNS), which enhanced DNS security by adding signatures to DNS records. …”
    Get full text
    Article
  2. 3742

    Forgery face detection method based on multi-domain temporal features mining by Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU

    Published 2023-06-01
    “…Financial technology has greatly facilitated people’s daily life with the continuous development of computer technology in the financial services industry.However, digital finance is accompanied by security problems that can be extremely harmful.Face biometrics, as an important part of identity information, is widely used in payment systems, account registration, and many other aspects of the financial industry.The emergence of face forgery technology constantly impacts the digital financial security system, posing a threat to national asset security and social stability.To address the security problems caused by fake faces, a forgery face detection method based on multi-domain temporal features mining was proposed.The tampering features were distinguished and enhanced based on the consistency of statistical feature data distribution and temporal action trend in the temporal features of videos existing in the spatial domain and frequency domain.Temporal information was mined in the spatial domain using an improved LSTM, while in the frequency domain, temporal information existing in different frequency bands of the spectrum was mined using 3D convolution layers.The information was then fused with the tampering features extracted from the backbone network, thus effectively distinguishing forged faces from real ones.The effectiveness of the proposed method was demonstrated on mainstream datasets.…”
    Get full text
    Article
  3. 3743

    Effectiveness Evaluation of Random Forest, Naive Bayes, and Support Vector Machine Models for KDDCUP99 Anomaly Detection Based on K-means Clustering by Zhang Majun

    Published 2025-01-01
    “…Security in the World Wide Web has recently seen an enormous upgrade in almost every aspect. …”
    Get full text
    Article
  4. 3744

    Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks by Walter Tiberti, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci

    Published 2020-10-01
    “…This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. …”
    Get full text
    Article
  5. 3745
  6. 3746

    THE MENACE OF BANDITRY AND KIDNAPPING IN NIGERIA: AN ASSESSMENT OF SHEIKH GUMI'S MEDIATORY ROLE IN THE RELEASE OF GREENFIELD UNIVERSITY KIDNAPPED STUDENTS by SOLOMON AYANTAYO OJO, OLUSEGUN STEVE ADEGOKE

    Published 2025-01-01
    “… The increase in banditry and kidnapping in Nigeria has created significant security challenges in recent years, particularly with attacks on educational institutions where students are abducted for ransom. …”
    Get full text
    Article
  7. 3747

    Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta) by Rizki Dewantara, Bambang Sugiantoro

    Published 2021-11-01
    “…Abstract Attacks on networks today are very common, with more and more ways to access data and the development of technology used, they will certainly cause an increase in network security threats. Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
    Get full text
    Article
  8. 3748

    Public key searchable encryption scheme based on blockchain by Ruizhong DU, Ailun TAN, Junfeng TIAN

    Published 2020-04-01
    “…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
    Get full text
    Article
  9. 3749
  10. 3750

    Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges by Yide Liu

    Published 2012-09-01
    “…However, the increased application of wireless sensor network also introduce new security challenges, especially related to privacy, connectivity, and security management, causing unpredicted expenditure and disaster to both utilities and consumers. …”
    Get full text
    Article
  11. 3751
  12. 3752

    Single password authentication method for remote user based on mobile terminal assistance by Yuan XU, Chao YANG, Li YANG

    Published 2019-02-01
    “…To address the issue that users frequently reuse their weak passwords in password-based authentication system,single password authentication based on secret sharing between server and mobile terminal (SPASS) was proposed,which allows a remote user to use a single password to authenticate to multiple services securely and has no need to store any secret of the user in the client PC.Even when the mobile device is lost or stolen,no damage to the user’s information will be induced.Security analysis and performance test show that SPASS greatly improves the security of the user’s secret information and resists dictionary attacks,honeypot attacks,cross-site scripting attacks etc.Furthermore,the proposed scheme can lighten burden of the user’s memory,reduce the storage pressure and easy to be deployed.…”
    Get full text
    Article
  13. 3753

    Label-based protection scheme of vTPM secret by Xingshu CHEN, Wei WANG, Xin JIN

    Published 2018-11-01
    “…The virtual trusted platform module (vTPM) played an important role in virtualization of trusted computing.According to security problems of existed vTPM,a protection scheme based on vTPM label was proposed.Firstly,a vTPM label was created for each virtual machine.This label had four main components,signature information,encryption information,measurement information and status information.Then,the security-enhanced vTPM dynamic migration protocol based on vTPM label status information was designed,to ensure the security of vTPM during live migration based on status information of vTPM label.Experiments show that the proposed scheme can protect vTPM secrets effectively and the increased performance cost during live migration is only 19.36%.…”
    Get full text
    Article
  14. 3754

    Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments by Youngseok Chung, Seokjin Choi, Dongho Won

    Published 2015-11-01
    “…Authentication and privacy protection are important security mechanisms for keeping things safe in the Internet of Things environments. …”
    Get full text
    Article
  15. 3755

    Network isolation communication scheme to resist against covert channel by Feng-hua LI, Miao-miao TAN, Kai FAN, Kui GENG, Fu ZHAO

    Published 2014-11-01
    “…With the rapid development of network technologies,real-time information exchanging between heterogeneous networks becomes more frequently.To effectively guarantee the secure and real-time information exchanging crossing different networks,a network isolation communication scheme (NICS) is proposed to resist against covert channel.A newly theoretical model of NICS is designed and proved based on the information theory,and followed with a specific solution.Security analysis indicates that the NICS is able to effectively solve problems of the potential packet lengths’ covert channel (PLCC) and the status covert channel (SCC) in most of the existing work; and,given similar amount of information for exchanging,the NICS can achieve equivalent security degree with the physical isolation in terms of resisting against the covert channel.…”
    Get full text
    Article
  16. 3756
  17. 3757

    Two-factor authenticated key agreement protocol based on biometric feature and password by Xiao-wei LI, Deng-qi YANG, Ben-hui CHEN, Yu-qing ZHANG

    Published 2017-07-01
    “…A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.…”
    Get full text
    Article
  18. 3758

    Distributed storage causal consistency model with trusted constraint by Junfeng TIAN, Juntao ZHANG, Yanbiao WANG

    Published 2021-06-01
    “…At present, there are few mature solutions to consider security risks in the research field of distributed storage causal consistency.On the basis of hybrid logic clock and HashGraph, combined with trusted cloud alliance technology in trusted cloud platform, a distributed storage causal consistency model (CCT model) with trust constraints was proposed.The CCT model designed identity authentication and consistent data trust verification mechanism on the client side and the server side respectively, and imposed security constraints on the process of data synchronization between data replicas in the cloud storage cluster.Through the simulation experiment, CCT model can identify and verify the identity signature forgery, illegal third party and other security risks in the client and server, and provide the trusted constraint for the system on the premise of causing small performance cost.…”
    Get full text
    Article
  19. 3759

    Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement by Zhiqiang YAO, Zhirong ZHU, Guohua YE

    Published 2021-08-01
    “…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
    Get full text
    Article
  20. 3760

    Survey of code-based digital signatures by Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN

    Published 2021-08-01
    “…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
    Get full text
    Article