Showing 3,881 - 3,900 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 3881

    Hedging for Balancing: Japan’s Foreign Policy in the 2010s–2020s by Kei KOGA

    Published 2024-12-01
    “…Nonetheless, the relative decline in the United States’ global strategic influence has compelled Japan to adopt a “security hedging” approach. Japan seeks to strengthen strategic relations with non-US security partners both within and beyond the Indo-Pacific region, diversifying the risks of diplomatic overdependence on the United States while continuing to fortify military cooperation with it.…”
    Get full text
    Article
  2. 3882

    Hybrid-structured onion scheme against replay attack of MIX by SHI Jin-qiao, FANG Bin-xing, GUO Li, WANG Li-hong

    Published 2009-01-01
    “…Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against replay attack, and the authentication property of layered encryption was utilized to protect integrity of messages.Meanwhile, symmetric encryption was imported to improve efficiency.Analysis shows that the hybrid-structured onion scheme can resist replay attack with guarantee of security and efficiency.…”
    Get full text
    Article
  3. 3883

    Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation by JIA Wei1, LIAN Yi-feng2, FENG Deng-guo2, CHEN Si-si3

    Published 2008-01-01
    “…To evaluate the large-scale computer networks,a Bayesian-network-approximate-reasoning-based method for vulnerabilities evaluation was proposed.First,it models the elements which compose the network and the factors which affect the network security.Second,it builds the attack state graph(ASG) of the computer network to describe the process of vulnerability exploitation.Then,it makes the approximate reasoning to the ASG by stochastic sampling.At last,after the samples analysis and statistic,it achieves the quantitative evaluation result and will provide the theoretical evidence to improve the network security.…”
    Get full text
    Article
  4. 3884

    Survey on phishing detection research by Xi FU, Hui LI, Xingwen ZHAO

    Published 2020-10-01
    “…With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats caused by phishing attacks.Firstly,starting with the basic concepts of phishing,the current application scenarios of phishing identification were summarized.Then,the research status of phishing identification technology in detail were analyzed.Finally,possible future research directions were discussed.…”
    Get full text
    Article
  5. 3885

    Cryptographic secrecy of steganographic matrix encoding by Jia-yong CHEN, Jiu-fen LIU, Yue-fei ZHU, Wei-ming ZHANG

    Published 2012-06-01
    “…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
    Get full text
    Article
  6. 3886

    Verifier-based password-authenticated key exchange protocol for three-party by LI Wen-min, WEN Qiao-yan, ZHANG Hua

    Published 2008-01-01
    “…The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.An efficient verifier-based protocol for three parties was pro-posed which contains the following characteristics: against dictionary attack and server compromise attack;providing key secrecy and forward secrecy;ensuring no key control;against known-key attack and man in-the-middle attack and re-ceiving four session keys in performing protocol one time.…”
    Get full text
    Article
  7. 3887
  8. 3888
  9. 3889
  10. 3890

    INSECURITY AND GIRL CHILD EDUCATION IN NORTH-EAST NIGERIA: A CASE OF CHIBOK AND DAPCHI QUAGMIRE by Gloria Samdi Puldu, Rwang Patrick Stephen

    Published 2022-12-01
    “…The authors argued that, there is a nexus between girl child education growth, development and security. The paper recommend adequate security to all schools in the north-east as means of confidence building for parents to release their female children to school. …”
    Get full text
    Article
  11. 3891

    Ternary polynomial based key management scheme for wireless sensor network by Zhi-tao GUAN, Yue XU, Jun WU

    Published 2013-12-01
    “…A ternary polynomial based key management (KMTP) scheme was proposed,which is effective in cluster based wireless sensor networks.Firstly,the base station will give each node one unique identi ier to ensure the validity of the node.Then,algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated,which can ensure the value of the cracking threshold is bigger than the number of nodes of a clus-ter and all clusters separately,which means it's very hard to be cracked even all nodes of a cluster or all clusters are com-promised.To assure the communication security,inter-cluster multi-hop routing mechanism was designed based on con-structing secure conjunct neighbor table.Finally,the updating parameter and the updating authentication number were in-troduced in rekeying phase.The analysis shows that the proposed scheme can meet the security requirement of key man-agement,and it also has less computation cost and storage cost than the existing schemes.…”
    Get full text
    Article
  12. 3892

    Data comparable encryption scheme based on cloud computing in Internet of things by Qian MENG, Jianfeng MA, Kefei CHEN, Yinbin MIAO, Tengfei YANG

    Published 2018-04-01
    “…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
    Get full text
    Article
  13. 3893

    Improved RLCE public key encryption scheme based on Polar codes by Zhe LI, Yiliang HAN, Yu LI

    Published 2020-10-01
    “…For PolarRLCE has no semantic security and be vulnerable to adaptively chosen ciphertext attacks.Based onrandom linear code encryptionscheme,the structure of the RLCE scheme and Polar code polarization propertieswere used to make the Polar code as underlying encoding scheme,and through the method of RLCEspad message padding,a kind of improved public key encryption scheme which considers semantic security and can resistant toadaptively chosen ciphertext attacks was proposed.The improved scheme transformed the public key matrix into a system matrix and reduces the storage space of the public key.Some pre-computation for private key are estimated to reduce the storage space of private key.Through analysis,this scheme does not change the structure of PolarRLCE scheme,which can resist structural attacks against hamming quasi-cyclic codes.At the 128 bit security level,compared with HermitianRLCE scheme,GRSRLCE scheme and GoppaMcEliece scheme,the public key size of this scheme decreased by 4%,46.5% and 47.9% respectively.…”
    Get full text
    Article
  14. 3894

    WSN key recovery attack based on symmetric matrix decomposition by Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG

    Published 2018-10-01
    “…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N&lt;sup&gt;6&lt;/sup&gt;).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
    Get full text
    Article
  15. 3895

    Blockchain-based noisy data sharing control protocol by Qingqing XIE, Nianmin YANG, Xia FENG

    Published 2023-10-01
    “…Blockchain provides a trusted channel for information sharing in an untrusted network.However, blockchain ledgers are public and transparent.Hence, the sensitive data stored in plaintext on the blockchain will compromise user privacy.Considering privacy preservation, users are more inclined to provide noisy data.And in different application scenarios, the level of data noise that users need to provide also varies.To this end, a secure, efficient, and searchable noisy data sharing control protocol was proposed based on the blockchain and smart contract technology with the ciphertext policy attribute-based encryption (CP-ABE) algorithm.First, an outsourced CP-ABE algorithm was introduced to reduce the computing burden on the user side.Secondly, smart contract was implemented to perform data search on ciphertext, which could prevent malicious operations by malicious servers.Third, the proposed protocol reduced the data update complexity to O(1), which is friendly to the scenarios with real-time data update.Finally, security analysis and simulation experiments demonstrate the security and feasibility of the proposed protocol.…”
    Get full text
    Article
  16. 3896

    Vulnerabilities scoring approach for cloud SaaS by Zhou LI, Cong TANG, Jian-bin HU, Zhong CHEN

    Published 2016-08-01
    “…,dependency relationships between services).VScorer,a novel security frame work to score vulnerabilities in various cloud services were presented based on different given require-ments.By inputting concrete business context and security requirement into VScorer,cloud provider can get a ranking list of vulnerabilities in the business based on the given security requirement.Following the ranking list,cloud provider was able to patch the most critical vulnerabilities first.A prototype was developed and VScorer can be demonstrazed to work better than current representative vulnerability scoring system CVSS.…”
    Get full text
    Article
  17. 3897
  18. 3898

    Electric power communication network service importance evaluation method for quantum key application by Guochun LI, Suxiang ZHANG, Wei DENG, Zhuozhi YU, Yefeng ZHANG, Yukun ZHU

    Published 2019-01-01
    “…Quantum keys have extremely high security. Applying the quantum keys to the power communication network encryption devices can greatly improve the security of service transmission. …”
    Get full text
    Article
  19. 3899
  20. 3900