Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3741
Large-scale measurement and analysis on misconfigurations of DNSSEC from recursive side
Published 2024-10-01“…Domain name system security extensions (DNSSEC) was a secure extension protocol for the domain name system (DNS), which enhanced DNS security by adding signatures to DNS records. …”
Get full text
Article -
3742
Forgery face detection method based on multi-domain temporal features mining
Published 2023-06-01“…Financial technology has greatly facilitated people’s daily life with the continuous development of computer technology in the financial services industry.However, digital finance is accompanied by security problems that can be extremely harmful.Face biometrics, as an important part of identity information, is widely used in payment systems, account registration, and many other aspects of the financial industry.The emergence of face forgery technology constantly impacts the digital financial security system, posing a threat to national asset security and social stability.To address the security problems caused by fake faces, a forgery face detection method based on multi-domain temporal features mining was proposed.The tampering features were distinguished and enhanced based on the consistency of statistical feature data distribution and temporal action trend in the temporal features of videos existing in the spatial domain and frequency domain.Temporal information was mined in the spatial domain using an improved LSTM, while in the frequency domain, temporal information existing in different frequency bands of the spectrum was mined using 3D convolution layers.The information was then fused with the tampering features extracted from the backbone network, thus effectively distinguishing forged faces from real ones.The effectiveness of the proposed method was demonstrated on mainstream datasets.…”
Get full text
Article -
3743
Effectiveness Evaluation of Random Forest, Naive Bayes, and Support Vector Machine Models for KDDCUP99 Anomaly Detection Based on K-means Clustering
Published 2025-01-01“…Security in the World Wide Web has recently seen an enormous upgrade in almost every aspect. …”
Get full text
Article -
3744
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. …”
Get full text
Article -
3745
Reliable detection of doppelgängers based on deep face representations
Published 2022-05-01Get full text
Article -
3746
THE MENACE OF BANDITRY AND KIDNAPPING IN NIGERIA: AN ASSESSMENT OF SHEIKH GUMI'S MEDIATORY ROLE IN THE RELEASE OF GREENFIELD UNIVERSITY KIDNAPPED STUDENTS
Published 2025-01-01“… The increase in banditry and kidnapping in Nigeria has created significant security challenges in recent years, particularly with attacks on educational institutions where students are abducted for ransom. …”
Get full text
Article -
3747
Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta)
Published 2021-11-01“…Abstract Attacks on networks today are very common, with more and more ways to access data and the development of technology used, they will certainly cause an increase in network security threats. Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
Get full text
Article -
3748
Public key searchable encryption scheme based on blockchain
Published 2020-04-01“…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
Get full text
Article -
3749
RETRACTED: Theoretical aspects of knowledge as the key to success and economic growth
Published 2023-01-01Get full text
Article -
3750
Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges
Published 2012-09-01“…However, the increased application of wireless sensor network also introduce new security challenges, especially related to privacy, connectivity, and security management, causing unpredicted expenditure and disaster to both utilities and consumers. …”
Get full text
Article -
3751
Linear Complexity of a New Class of Quaternary Generalized Cyclotomic Sequence with Period 2pm
Published 2020-01-01Get full text
Article -
3752
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01“…To address the issue that users frequently reuse their weak passwords in password-based authentication system,single password authentication based on secret sharing between server and mobile terminal (SPASS) was proposed,which allows a remote user to use a single password to authenticate to multiple services securely and has no need to store any secret of the user in the client PC.Even when the mobile device is lost or stolen,no damage to the user’s information will be induced.Security analysis and performance test show that SPASS greatly improves the security of the user’s secret information and resists dictionary attacks,honeypot attacks,cross-site scripting attacks etc.Furthermore,the proposed scheme can lighten burden of the user’s memory,reduce the storage pressure and easy to be deployed.…”
Get full text
Article -
3753
Label-based protection scheme of vTPM secret
Published 2018-11-01“…The virtual trusted platform module (vTPM) played an important role in virtualization of trusted computing.According to security problems of existed vTPM,a protection scheme based on vTPM label was proposed.Firstly,a vTPM label was created for each virtual machine.This label had four main components,signature information,encryption information,measurement information and status information.Then,the security-enhanced vTPM dynamic migration protocol based on vTPM label status information was designed,to ensure the security of vTPM during live migration based on status information of vTPM label.Experiments show that the proposed scheme can protect vTPM secrets effectively and the increased performance cost during live migration is only 19.36%.…”
Get full text
Article -
3754
Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments
Published 2015-11-01“…Authentication and privacy protection are important security mechanisms for keeping things safe in the Internet of Things environments. …”
Get full text
Article -
3755
Network isolation communication scheme to resist against covert channel
Published 2014-11-01“…With the rapid development of network technologies,real-time information exchanging between heterogeneous networks becomes more frequently.To effectively guarantee the secure and real-time information exchanging crossing different networks,a network isolation communication scheme (NICS) is proposed to resist against covert channel.A newly theoretical model of NICS is designed and proved based on the information theory,and followed with a specific solution.Security analysis indicates that the NICS is able to effectively solve problems of the potential packet lengths’ covert channel (PLCC) and the status covert channel (SCC) in most of the existing work; and,given similar amount of information for exchanging,the NICS can achieve equivalent security degree with the physical isolation in terms of resisting against the covert channel.…”
Get full text
Article -
3756
Draft genome sequence of Kei apple, an underutilized African tree crop
Published 2025-01-01“…Our genome assembly provides a valuable resource for unlocking the food security and nutraceutical potential of Kei apple.…”
Get full text
Article -
3757
Two-factor authenticated key agreement protocol based on biometric feature and password
Published 2017-07-01“…A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.…”
Get full text
Article -
3758
Distributed storage causal consistency model with trusted constraint
Published 2021-06-01“…At present, there are few mature solutions to consider security risks in the research field of distributed storage causal consistency.On the basis of hybrid logic clock and HashGraph, combined with trusted cloud alliance technology in trusted cloud platform, a distributed storage causal consistency model (CCT model) with trust constraints was proposed.The CCT model designed identity authentication and consistent data trust verification mechanism on the client side and the server side respectively, and imposed security constraints on the process of data synchronization between data replicas in the cloud storage cluster.Through the simulation experiment, CCT model can identify and verify the identity signature forgery, illegal third party and other security risks in the client and server, and provide the trusted constraint for the system on the premise of causing small performance cost.…”
Get full text
Article -
3759
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01“…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
Get full text
Article -
3760
Survey of code-based digital signatures
Published 2021-08-01“…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
Get full text
Article