Showing 3,841 - 3,860 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3841

    Fair and rational delegation of computation in the universally composable framework by Youliang TIAN, Xiaoxia JIANG

    Published 2021-09-01
    “…To realize the economic and reputation fairness in rational delegation of computation, a fair and rational delegation of computation scheme based on blockchain model of cryptography in the universally composable (UC) framework was proposed.Firstly, a bidirectional reputation incentive model between the delegator and the calculator was presented by combining direct reputation and indirect reputation.Secondly, a dynamic game model with perfect information for fair and rational delegation of computation was constructed based on game theory, and a unique sub-game Nash equilibrium was further obtained.In addition, by analyzing the requirements for verifiability, rational decision of players, economic and reputation fairness, as well as adversary model, the ideal functionality for fair and rational delegation of computation was proposed.Finally, a fair and rational delegation of computation protocol by combining succinct commit-and-prove and smart contract was proposed to securely realize the ideal functionality.The security analysis shows that the proposed protocol satisfies UC security.…”
    Get full text
    Article
  2. 3842

    Design and analysis of enterprise management system framework based on blockchain by Wei ZHAO, Wenyin ZHANG, Jiuru WANG, Yawei ZHANG

    Published 2019-04-01
    “…How to enhance the management of modern enterprises by blockchain technology has attracted more and more attention.ERP (enterprise resource planning) technology combined modern information technology with enterprise production process management,and effectively strengthened the work efficiency and management level of enterprises.But there were inherent pain points such as equipment security,data security,industrial control security,information leakage and so on.Aimed at the problems exposed by ERP system,a blockchain based framework mod el of ERP system proposed by taking advantage of the characteristics of decentralization,de-trust,openness and transparency,trusted database and traceability of blockchain.The key point is to solved the problem of credible and efficient data collaboration in the production and management process of enterprises.Combine with the incentive mechanism of blockchain,use token to strengthen collaborative management and improve efficiency,which provide a new idea for enterprise performance evaluation and assessment.…”
    Get full text
    Article
  3. 3843

    Blockchain-based distributed EHR fine-grained traceability scheme by Zuobin YING, Yuanping SI, Jianfeng MA, Ximeng LIU

    Published 2021-05-01
    “…Aiming at the key management of electronic health records (EHR) in a distributed system and user identity tracing issues, a distributed EHR fine-grained traceability scheme based on blockchain was proposed.Combining chameleon hash and zero-knowledge proof technology, the registration of nodes on the blockchain and the generation of identity certificates were realized, and the traceability of malicious users on the blockchain was realized.Besides, given the single point of failure problem of key management, the attribute-based encryption scheme of distributed ciphertext strategy was designed to achieve secure and fine-grained data access control, and multiple decryption agency blockchain nodes were set up to jointly distribute the attribute private keys of user nodes.The security analysis shows that the traceable distributed key generation attribute-based encryption algorithm based on the blockchain is adaptively secure under the random oracle model, and through experiments, the feasibility and practicability of the proposed scheme are shown.…”
    Get full text
    Article
  4. 3844

    Efficient anonymous password-based authenticated key exchange scheme by TAN Shi-chong, PANG Liao-jun, SU Wan-li, WANG Yu-min

    Published 2009-01-01
    “…,the key was used for data confidentiality and/or integrity).There has been much interest in password-authenticated key exchange protocol which remains secure even when users choose passwords from a small space of possible passwords,such as a dictionary of English words.A password-based authenticated key exchange scheme was proposed.The analysis shows that the scheme is secure against dictionary attack under the computational Diffie-Hellman intractability assumption,and preserves user privacy and achieves unlinkability.Furthermore,since denial-of-service(DoS) attacks have become a common threat,DoS-resistantance is a design consid-eration and the scheme is proved to be secure against denial-of-service attacks.…”
    Get full text
    Article
  5. 3845
  6. 3846

    National interest of the Republic of Serbia for participation of Serbian Armed Forces in peacekeeping operations by Radojević Slobodan, Blagojević Srđan

    Published 2024-01-01
    “…Starting from the fact that global security is comprehensive and indivisible, states are even more interested in participating in peacekeeping operations and perceive it as their national interests and an element of foreign and security policy. …”
    Get full text
    Article
  7. 3847

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure device communication. IoT devices often operate under strict constraints in processing power, memory, and energy consumption, complicating the implementation of robust security measures. …”
    Get full text
    Article
  8. 3848

    Trusted and anonymous authentication scheme for wireless networks by YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2

    Published 2009-01-01
    “…A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security.…”
    Get full text
    Article
  9. 3849

    Method for trust analysis of exchange process behavior based on noninterference by Yi SUN, Xing-yuan CHEN, Xue-hui DU, Cheng LEI

    Published 2014-12-01
    “…Aiming at the problem of dynamic data security exchange behavior cannot be controlled,methods for trusted analysis of exchange process behavior based on noninterference are proposed.First,the exchange behavior model is for-malized from the perspective of the exchange process.Then,the exchange behavior trust constraint rules,exchange be-havior trust judgment theorem and security proof are given in different stages and different mode.Finally,a concrete ap-plication example shows the availability of the method.…”
    Get full text
    Article
  10. 3850

    Analysis on the application and development of quantum communication by Junsen LAI, Bingbing WU, Rui TANG, Wenyu ZHAO, Haiyi ZHANG

    Published 2016-03-01
    “…Quantum communication,which can provide unconditional security,is a physical layer solutions for information security.The status and challenge of its technology development and application are the focus of the industry.The field trials of quantum communication and main problem were analyzed.Driving force and bottleneck of its commercialization were clarified and worldwide standardization research were reviewed.System performance test and evaluation were discussed and future development recommendations were also provided.…”
    Get full text
    Article
  11. 3851

    The Passive Defense and Sustainable Development with Emphasis on Threat Ridden Land Uses of Tabriz, as a Metropolitan city, in Terms of War by Karim Husseinzadeh Dalir, Kiumars Maleki, Arezo Shafaati, Mohammad Rauf Heidarifar

    Published 2012-02-01
    “…The alteration of land uses based on defense and security issues, concentrating on the principles of passive defense, and getting benefited from the experiences of the pioneering countries in this regards could be very influential in sustainable and secure urban planning and development. …”
    Get full text
    Article
  12. 3852

    MQTT in Action: Building Reliable and Scalable Home Automation Systems by Bilal Raslen, Maysaa Salama

    Published 2024-12-01
    “…Future research will focus on enhancing the security of the MQTT protocol against spoofing attacks through the integration of AI for threat detection and blockchain technology for enhanced data security.…”
    Get full text
    Article
  13. 3853

    RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext by Hari Murti, Edy Supriyanto, Rara Redjeki, Eka Ardhianto

    Published 2022-12-01
    “…Cryptography and steganography techniques have an important role in securing information. Parallel Encryption with Digit Arithmetic of Covertext (PDAC) encryption model adopts cryptography and steganography for securing messages. …”
    Get full text
    Article
  14. 3854

    Model of cyberspace threat early warning based on cross-domain and collaboration by Gang XIONG, Yuwei GE, Yanjie CHU, Weiquan CAO

    Published 2020-12-01
    “…The development of network threat shows the characteristics of initiative,concealment and ubiquity.It poses a severe challenge to the passive,local and isolated traditional network defense mode.In view of the new trend of integration of big data,artificial intelligence and network security,a cross-domain collaborative network threat early warning model was proposed,which could enable and increase efficiency for cyberspace security.Firstly,starting from the overall structure of the protected network space,the model constructs a cross-domain function framework with the vertical and horizontal conjunction by dividing the security threat domain,decomposing the system function,designing the information sharing mechanism.Secondly,to enhance the ability of threat information detection,the collaborative technology architecture is designed by the logic of hierarchical management,and the key technologies involved in threat information perception,processing and application,are systematically introduced.Finally,with the help of application scenarios,qualitatively the capability increment of the proposed threat early warning model was described.…”
    Get full text
    Article
  15. 3855

    Blockchain efficient Byzantine fault tolerance consensus algorithm for IIoT by LI Fengqi, SONG Qingqing, XU Hui, DU Xuefeng, GAO Jialong, TONG Ning, WANG Deguang

    Published 2024-05-01
    “…Nodes with high credit were randomly selected as the master node by the adaptive master node algorithm, ensuring its security. Experimental results show that CD-PBFT not only can maintain the safety and liveness of the consensus algorithm but also can reduce network delay by 34.8% and increase throughput by 25.2% compared with PBFT, which meets the double requirements of efficiency and security fault tolerance.…”
    Get full text
    Article
  16. 3856

    Efficient strong privacy protection and transferable attribute-based ticket scheme by Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG

    Published 2022-03-01
    “…To solve the problems of efficiency, flexibility, and privacy protection faced by electronic tickets, an efficient and transferable attribute-based ticket scheme with strong privacy protection was proposed.Firstly, a ticket issuing algorithm based on attribute disclosure was constructed by combining attribute-based credentials and set commitment.Secondly, the structure-preserving signature on equivalence class and dynamic malleable signature were used to reduce the computational complexity of the ticket issuance, and the ticket transfer and ticket verification with constant complexity were realized.In addition, to prevent the possibility of malicious verifiers guessing user information according to the seller’s identity, the scheme not only realized the anonymity of the user, but also realized the anonymity of the seller in the ticket verification for the first time.Finally, the security definition of the scheme was given, and its security was reduced to either well-known complexity cryptography assumptions or the security of proven cryptography primitives.Comparison and experimental results demonstrate that the proposed scheme is flexible and efficient.…”
    Get full text
    Article
  17. 3857

    PKI cross-domain authentication scheme based on advanced PBFT algorithm by Sijie QIAN, Liquan CHEN, Shihui WANG

    Published 2020-08-01
    “…In order to solve the efficiency problem of the existing public key infrastructure cross-domain authentication scheme,a cross-domain authentication model based on the consortium blockchain which has the advantages of distributed and difficult to be tamperd with was proposed.On the one hand,the dynamic join and exit function was added to the practical Byzantine fault tolerant (PBFT) algorithm,the primary node election mode was improved,and the three-stage broadcast was reduced to two-stage broadcast for the reducation of communication overhead.On the other hand,the cross-domain authentication system architecture based on consortium chain was designed,the blockchain certificate format and the cross-domain authentication protocol were presented,the security and efficiency were analyzed.The results shows that in term of security,the proposed model has security attributes such as resisting distributed attacks.In terms of performance,the proposed model has advantages in both computational overhead and communication overhead when it was compared with the existing cross-domain authentication schemes.…”
    Get full text
    Article
  18. 3858

    A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching by Zhigang Chen, Jian Wang, Liqun Chen, Xinxia Song

    Published 2014-01-01
    “…We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level.…”
    Get full text
    Article
  19. 3859
  20. 3860