Showing 3,761 - 3,780 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 3761

    Quantum Key Relay Scheme Based on Trusted Control Center by Shaosheng Jiang, Ruinan Chi, Xiaojun Wen

    Published 2014-06-01
    “…A transmit quantum key relay scheme based on trusted control center and trusted quantum relay server was proposed.The quantum key one-time pad encryption algorithm was used in the design of trusted relay protocol.Upon the establishment of trusted relay network,the trusted control center was used to ensure the credibility and security of access relay,and the user's IP address was hidden in the quantum information data that had been encrypted only for the legal user to decrypt and transmit credible information.The security analysis shows,users who do not connect with the quantum channel can still use the trusted relay network to transmit quantum key securely in a long-distance transmission while attackers can not obtain useful quantum key information from the network.…”
    Get full text
    Article
  2. 3762

    Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain by Xuewang ZHANG, Zhihong LI, Jinzhao LIN

    Published 2022-08-01
    “…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
    Get full text
    Article
  3. 3763
  4. 3764

    A Hybrid Approach to Protect Palmprint Templates by Hailun Liu, Dongmei Sun, Ke Xiong, Zhengding Qiu

    Published 2014-01-01
    “…Accuracy, changeability, and security are three critical requirements for template protection algorithms. …”
    Get full text
    Article
  5. 3765

    Overview of research on trusted attestation technology of cloud virtualization platform by Bibo TU, Jie CHENG, Haojun XIA, Kun ZHANG, Ruina SUN

    Published 2021-12-01
    “…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
    Get full text
    Article
  6. 3766

    Survey on privacy preserving techniques for blockchain by Zonghui WANG, Shengli ZHANG, Shi JIN, Hui WANG

    Published 2018-09-01
    “…Blockchain is a kind of distributed ledger technology with the characteristics of decentralization,security reliability,tamper-proof and programmable.The open and transparent feature of the blockchain system has seriously threatened the transaction privacy of users,and the corresponding privacy problem solution is designed for different application scenarios.Firstly,the basic working principle of block chain technology was introduced,and typical privacy issues was introduced in blockchain,such as transaction privacy and account privacy.Secondly,the existing typical blockchain privacy protection schemes were divided into three types:mixed-coin technology,cryptography technology and secure channel technology,and presents a comprehensive and comprehensive introduction to this three privacy protection schemes; Finally,the blockchain data privacy protection technology was analyzed,the application and development on IoT security were prospeted.…”
    Get full text
    Article
  7. 3767

    Hybrid Cryptography Based on Planets: Phobos & Deimos by Kraicha Ayoub, Touil Hamza, El Akkad Nabil

    Published 2025-01-01
    “…Remote access has become essential for business continuity but also introduces significant security risks. To address these issues, it is crucial to innovate in cryptography, the backbone of data security. …”
    Get full text
    Article
  8. 3768

    Comparison of Military Potentials of USA, PRC, and Some Countries in APR from the Standpoint of Western Analysts by M. Tchaikovsky, A. Kazantsev

    Published 2012-08-01
    “…In connection with the rising significance of the APR in the global economy, Western military and political analysts consider the PRC power strengthening as a challenge to the security and impact of the USA not only in this region, but also globally. …”
    Get full text
    Article
  9. 3769
  10. 3770

    Les syndicats, les commissaires et le politique : (re)valorisations et conflits autour de la profession policière en Tunisie (2011-2022) by Audrey Pluta

    Published 2023-12-01
    “…After 14 January 2011, the socio-professional conditions of members of the security forces became increasingly public, but also led to an unprecedented mobilisation of Tunisian police officers. …”
    Get full text
    Article
  11. 3771
  12. 3772

    Blockchain-IoT Healthcare Applications and Trends: A Review by Wafaa A. N. A. Al-Nbhany, Ammar T. Zahary, Asma A. Al-Shargabi

    Published 2024-01-01
    “…Integrating blockchain technology with IoT extensively helps provide basic security requirements owing to the built-in security structure of the blockchain. …”
    Get full text
    Article
  13. 3773

    Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks by Changjin Xu, Maoxin Liao, Peiluan Li

    Published 2019-01-01
    “…In recent years, with the rapid development of the Internet and the Internet of Things, network security is urgently needed. Malware becomes a major threat to network security. …”
    Get full text
    Article
  14. 3774

    Filipino attitude and perception on Subscriber Identity Module (SIM) Card Registration Act by Aera L. Diaz, Romano M. Balbacal

    Published 2024-12-01
    “…These insights underscore the need for more robust security measures in the registration process to enhance public trust. …”
    Get full text
    Article
  15. 3775

    Water Accounting and Productivity Analysis to Improve Water Savings of Nile River Basin, East Africa: From Accountability to Sustainability. by Hirwa, Hubert, Zhang, Qiuying, Li, Fadong, Qiao, Yunfeng, Measho, Simon, Muhirwa, Fabien, Xu, Ning, Tian, Chao, Cheng, Hefa, Chen, Gang, Ngwijabagabo, Hyacinthe

    Published 2024
    “…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
    Get full text
    Article
  16. 3776
  17. 3777

    Do relationships with parents determine citizens’ reactions to war trauma? by Alicja Senejko, Ewa Gurba, Piotr Oleś, Mateusz Marek, Tomasz Franc, Krzysztof Gurba

    Published 2024-02-01
    “…In contrast, a secure attachment style, along with frustration of the need for competence and intensity of threats, is a predictor of constructive defenses, while a secure attachment style is a predictor of PTG. …”
    Get full text
    Article
  18. 3778

    System-Level Digital Twin Modeling for Underwater Wireless IoT Networks by Lei Wang, Lei Yan, Xinbin Li, Song Han

    Published 2024-12-01
    “…We introduce a voting-based security prediction model to significantly bolster security in underwater wireless communication. …”
    Get full text
    Article
  19. 3779

    Cryptanalysis of an efficient group signature schemen by LU Rong-bo1, XUAN Heng-nong3, HE Da-ke2

    Published 2007-01-01
    “…The security flaws of the group signature proposed by Zhang Jianhong and etc.was analyzed.It pointed out that the group signature was not untraceable for the revocation center could not open a valid group signature.A coalition attack that the manager and the revocation center could conspire to generate valid group signatures and impose them on an arbitrary member of the group was presented.The security analysis show that the scheme is insecure.…”
    Get full text
    Article
  20. 3780

    Multi-parties key agreement protocol based on elliptic curve by Long GAO, Chun-ming TANG, Yong-qiang ZHANG

    Published 2016-05-01
    “…The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.…”
    Get full text
    Article