Showing 3,861 - 3,880 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 3861
  2. 3862
  3. 3863
  4. 3864

    Implementation of Coding Theory with The Extended Hamming Code in Steganography by Nurul Jannah, Nur Hamid

    Published 2024-01-01
    “…Data security needs to be considered to avoid noise when sending data or data breaches by hackers. …”
    Get full text
    Article
  5. 3865

    Shamir-based virtual machine placement policy by Junfeng TIAN, Zilong WANG, Xinfeng HE, Zhen LI

    Published 2019-10-01
    “…In order to alleviate the harm of co-location attack in cloud environment,a virtual machine placement strategy based on Shamir was proposed,and a virtual machine placement framework was designed.The security of key data was ensured by the blockchain in the proposed placement strategy.The virtual machine placement policy could effectively improve the security of the virtual machine and the load balancing capability of the cloud environment,and reduce resource waste.Finally,the effectiveness of the scheme is proved by simulation experiments.…”
    Get full text
    Article
  6. 3866

    Fragile watermarking technique for detecting image by Yu-hong CHANG, Hui-fen HUANG, Zhi-hong WANG

    Published 2017-07-01
    “…Aiming at the problem of image tampering and forensic localization,a fragile watermarking algorithm based on chaos sequence and image QR decomposition was proposed to determine the image tampering.The algorithm chooses QR decomposition to decompose the image,embeds the watermark after the image is decomposed,and encrypts the watermark by chaotic system to enhance the security of the watermark.Experimental results show that the algorithm not only improves the security of the location watermarking algorithm,but also can estimate the tampering strength of the tampered area.…”
    Get full text
    Article
  7. 3867
  8. 3868

    IoT enabled data protection with substitution box for lightweight ciphers by K.B. Sarmila, S.V. Manisekaran

    Published 2025-03-01
    “…A lightweight cryptographic design is required for securing the data revolving around constrained devices. …”
    Get full text
    Article
  9. 3869

    Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions by Jinwook Kim, Kyungroul Lee, Hanjo Jeong

    Published 2025-01-01
    “…However, these approaches also face significant security challenges due to the potential exposure of mouse input data. …”
    Get full text
    Article
  10. 3870

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  11. 3871

    Review of communication optimization methods in federated learning by YANG Zhikai, LIU Yaping, ZHANG Shuo, SUN Zhe, YAN Dingyu

    Published 2024-12-01
    “…With the development and popularization of artificial intelligence technologies represented by deep learning, the security issues they continuously expose have become a huge challenge affecting cyberspace security. …”
    Get full text
    Article
  12. 3872
  13. 3873

    Cross-domain authentication scheme based on consortium blockchain by Jianlin NIU, Zhiyu REN, Xuehui DU

    Published 2022-06-01
    “…To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockchain.The consortium blockchain was introduced into the cross-domain authentication scene by designing the layered cross-domain authentication architecture including entity layer, proxy layer, blockchain layer and storage layer.In the storage layer, abstract data format was designed and stored in the chain, and the complete data corresponding to the abstract data was stored in the interplanetary file system under the chain.This safe and reliable on-chain distributed storage scheme solved the limitation problem of on-chain storage caused by introduction of blockchain.Besides, an identity management scheme based on permanent autonomy identity and temporary identity was proposed to solve the challenges that it is difficult to cancel identity and to supervise anonymous identity after combining IBC system.On this basis, complete cross-domain full authentication, re-authentication and key negotiation protocols were designed to implement the cross-domain authentication process.In terms of security, SVO logic was used to analyze the authentication protocol, and the security of the cross-domain authentication protocol was proved.The performance of calculation overhead, communication overhead and consortium blockchain were tested and analyzed by simulation.Analysis results showed that the protocol satisfies the security requirements and has improved calculation overhead performance on both server and client sides, comparing with other related works.In terms of communication overhead, it also has better performance.The query/write latency was tested by the consortium blockchain tool, and the results showed that the scheme has good usability.…”
    Get full text
    Article
  14. 3874

    Key-customizable encrypted deduplication with access control for cloud storage by GU Bolun, XU Zikai, LI Weihai, YU Nenghai

    Published 2024-08-01
    “…Efficient deduplication and secure file sharing in the cloud have emerged as critical concerns. …”
    Get full text
    Article
  15. 3875

    Single-Pixel Compressive Digital Holographic Encryption System Based on Circular Harmonic Key and Parallel Phase Shifting Digital Holography by B. Lokesh Reddy, Anith Nelleri

    Published 2022-01-01
    “…The obtained results show that the proposed encryption scheme is feasible and has better security performance and robustness.…”
    Get full text
    Article
  16. 3876

    Mutual-information of meteorological-soil and spatial propagation: Agricultural drought assessment based on network science by Qingzhi Wen, Xinjun Tu, Lei Zhou, Vijay P Singh, Xiaohong Chen, Kairong Lin

    Published 2025-01-01
    “…Agricultural drought causes serious harm to food security and vegetation ecosystems, and challenges the entire food-water-energy-health-environment nexus, complicating, in turn, management strategies. …”
    Get full text
    Article
  17. 3877
  18. 3878
  19. 3879
  20. 3880