Showing 3,901 - 3,920 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3901

    Research on distributed identity authentication mechanism of IoT device based on blockchain by Chen TAN, Meijuan CHEN, Ebenezer ACKAH Amuah

    Published 2020-06-01
    “…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
    Get full text
    Article
  2. 3902

    Research on RTF array overflow vulnerability detection by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU

    Published 2017-05-01
    “…When the virtual function was executed,it could cause array overflow vulnerability due to error operation of the virtual function table of C++ object.By attacking the virtual function,it could cause the system crash,or even the attacker to control the execution of program directly was allowed,which threatened user’s security seriously.In order to find and fix this potential security vulnerability as soon as possible,the technology for detecting such security vulnerability was studied.Based on the analysis of the virtual function call during the MS Word parsing RTF files,the array overflow vulnerability generated by MS Word parsing abnormal RTF files,and a new RTF array overflow vulnerability detection method based on the file structure analytical Fuzzing was proposed.Besides,an RTF array overflow vulnerability detection tool (RAVD,RTF array vulnerability detector) was designed.The test results show RAVD can detect RTF array overflow vulnerabilities correctly.Moreover,the Fuzzing results show RAVD has higher efficiency in comparison with traditional file Fuzzing tools.…”
    Get full text
    Article
  3. 3903
  4. 3904

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…During recent years, Trojan viruses on Android systems have greatly evolved, and the frequent security breach of Android systems is rapidly becoming a great concern of contemporary cyber security. …”
    Get full text
    Article
  5. 3905

    A Mutual Broadcast Authentication Protocol for Wireless Sensor Networks Based on Fourier Series by Xiaogang Wang, Weiren Shi

    Published 2015-12-01
    “…The most important thing of MBAP is the mutual broadcast authentication method which ensures the security of the network greatly.…”
    Get full text
    Article
  6. 3906

    A survey of cybersecurity for intelligent connected-automated vehicle by Yufeng LI, Xiaoyuan LU, Chenhong CAO, Jiangtao LI, Hongyi ZHU, Nan MENG

    Published 2020-04-01
    “…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
    Get full text
    Article
  7. 3907

    Research on multidimensional dynamic defense strategy for microservice based on deep reinforcement learning by Dacheng ZHOU, Hongchang CHEN, Weizhen HE, Guozhen CHENG, Hongchao HU

    Published 2023-04-01
    “…Aiming at the problem that it is hard for security defense strategies in cloud native to guarantee the quality of service under dynamic requests, a multidimensional dynamic defense strategy for microservice based on deep reinforcement learning, named D2RA strategy, was proposed to provide dynamic configuration schemes that ensure security defense performance and quality of service for microservices under dynamical requests.Firstly, based on the characteristics of multiple replicas and invocation chains of microservices, a microservices state graph was established to depict the maps between requests, system configuration and security performance, quality of service, and resource overhead of microservices.Secondly, the D2RA framework was designed and a dynamic strategy optimization algorithm based on deep Q-network was proposed for microservices to provide fast and optimal system configurations update scheme under dynamic requests.The simulation results show that D2RA effectively allocate resources under dynamic requests, and achieve 19.07% more defense effectiveness and 42.31% higher quality of service as compared to the existing methods.…”
    Get full text
    Article
  8. 3908

    Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept by A. Drosou, D. Ioannidis, K. Moustakas, D. Tzovaras

    Published 2011-01-01
    “…Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. …”
    Get full text
    Article
  9. 3909

    Government Authority and Responsibility in the Universal Health Coverage Program from the Aspect of Participation and Financing by Titin Hamidah, Andika Persada Putera, Budi Pramono

    Published 2024-12-01
    “…Citizens' rights to Social Security are realized by the Government through the National Health Insurance Program (JKN Program) with the principles of Social Insurance. …”
    Get full text
    Article
  10. 3910

    Random-Parameters Behavioral Models to Investigate Determinants of Perceived Safety in Railway Stations by Pierluigi Coppola, Luigi dell’Olio, Fulvio Silvestri

    Published 2021-01-01
    “…The estimation results for a medium-sized railway station (Frosinone, Italy) confirmed that safety and security measures are not equally perceived by individuals and the use of random-parameters models leads to more robust estimates. …”
    Get full text
    Article
  11. 3911

    A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map by Ali Soleymani, Md Jan Nordin, Elankovan Sundararajan

    Published 2014-01-01
    “…In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. …”
    Get full text
    Article
  12. 3912

    A improved group quantum key distribution protocol with multi-party collaboration by Qi Yuan, Hao Yuan, MeiTong Zhou, JingJing Wen, JuYan Li, Bing Hao

    Published 2025-01-01
    “…Nevertheless, a crucial yet frequently underexplored challenge involves the comprehensive evaluation of security quantum state modulation. To address this issue, we propose a novel framework for quantum group key distribution. …”
    Get full text
    Article
  13. 3913

    Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and Challenges by K. Tlemcani, K. Azbeg, E. Saoudi, L. Fetjah, O. Ouchetto, S. Jai Andaloussi

    Published 2025-01-01
    “…In the evolving landscape of health information management, the application of blockchain and edge computing technologies to chronic disease management remains underexplored, despite the urgent need for scalable, secure, and real-time solutions. This systematic review examines the integration of these technologies in healthcare, with a specific focus on diabetes management. …”
    Get full text
    Article
  14. 3914

    Blockchain-Based Anonymous Reputation System for Performance Appraisal by Hye Jin Lee, Duc Anh Luong, Jong Hwan Park, Hyoseung Kim

    Published 2025-01-01
    “…ARSPA provides a secure and efficient approach to improve the reliability and fairness of performance appraisal.…”
    Get full text
    Article
  15. 3915

    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks by Mei Sun, Yuyan Guo, Dongbing Zhang, MingMing Jiang

    Published 2021-01-01
    “…In the open wireless communication environment, security and privacy protection are important contents of VANET research. …”
    Get full text
    Article
  16. 3916
  17. 3917

    Mediating role of fatigue driving in the influence of job demand and insecurity on safety incidents among bus drivers by Mustapha Amoadu, Isaac Tetteh Commey, Edward Wilson Ansah

    Published 2025-01-01
    “…Findings Both job demands and job security showed significant positive associations with safety incidents among the drivers. …”
    Get full text
    Article
  18. 3918

    Energy-Efficient and Trust-Based Autonomous Underwater Vehicle Scheme for 6G-Enabled Internet of Underwater Things by Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri, Khalid Zaman

    Published 2025-01-01
    “…The proposed scheme addresses key challenges in UASNs, such as energy consumption, network stability, and data security. It integrates a trust management framework that enhances communication security through node identification and verification mechanisms utilizing normal and phantom nodes. …”
    Get full text
    Article
  19. 3919

    Advancing eHealth in Society 5.0: A Fuzzy Logic and Blockchain-Enhanced Framework for Integrating IoMT, Edge, and Cloud With AI by Joy Dutta, Deepak Puthal

    Published 2024-01-01
    “…To ensure data integrity and security, we integrate the Proof of Authentication 2.0 (PoAh 2.0) consensus mechanism within a blockchain-enhanced IoMT-Edge-Cloud framework. …”
    Get full text
    Article
  20. 3920