Showing 3,941 - 3,960 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3941

    Privacy-preserving mining of association rules based on paillier encryption algorithm by Huan XING, Lin ZHANG

    Published 2016-01-01
    “…In privacy preserving association rule mining, the precision and security of mining are always a pair of contradictions. …”
    Get full text
    Article
  2. 3942
  3. 3943
  4. 3944
  5. 3945

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…Without security, the message is often utilized by an irresponsible person. …”
    Get full text
    Article
  6. 3946
  7. 3947
  8. 3948

    Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks by Yang Yang, Xiaoyu Jin, Su Yao, Xuesong Qiu, Liu Liu

    Published 2017-06-01
    “…In addition, the introduction of the malicious behavior feedback mechanism ensures the security of sensors in the mobile agent system. The experimental results show that the reputation model of incomplete β distribution can simulate the actual situation well, resist the attacks of malicious agents, and ensure the security of sensors in the system.…”
    Get full text
    Article
  9. 3949

    Certificateless public key cryptography based provable data possession scheme in edge environment by Ziyuan WANG, Ruizhong DU

    Published 2022-07-01
    “…In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.…”
    Get full text
    Article
  10. 3950

    Survey on key technologies for protective DNS service by MA Yongzheng, LI Hongtao, MA Zhongsheng, HU Weihong, ZHANG Zhongxian

    Published 2024-10-01
    “…It serves as the entry point for users to access Internet applications and is also the key point for client-side security threat perception and mitigation. Common DNS abuses and related security threats on the client side include phishing, malware, and other attacks based on DNS. …”
    Get full text
    Article
  11. 3951

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  12. 3952

    APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks by Wei Ren, Liangli Ma, Yi Ren

    Published 2013-06-01
    “…In this paper, we make the first attempt to solve those two security risks together without relying cryptography. …”
    Get full text
    Article
  13. 3953

    Towards DevSecOps Model for Multi-tier Web Applications by Rida Abderrahim, Ait Lahcen Ayoub

    Published 2024-01-01
    “…Development, Security and Operations (DevSecOps) as part of Continuous Deployment (CD) or Continuous Delivery (CD) are considered a reliable link for communication and collaboration between development, security and operations teams. …”
    Get full text
    Article
  14. 3954

    Impacts of Cultivated Land Reclamation on the Climate and Grain Production in Northeast China in the Future 30 Years by Qingling Shi, Yingzhi Lin, Enpei Zhang, Haiming Yan, Jinyan Zhan

    Published 2013-01-01
    “…The result of this study can provide some theoretical support to the agricultural economic development in Northeast China and serve the national macropolicy and food security strategy of the whole China.…”
    Get full text
    Article
  15. 3955

    Fuzzy-Based Trust Prediction Model for Routing in WSNs by X. Anita, M. A. Bhagyaveni, J. Martin Leo Manickam

    Published 2014-01-01
    “…The sensitive application environments and resource constraints of WSNs mandate the requirement of lightweight security scheme. The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nodes in the network. …”
    Get full text
    Article
  16. 3956

    Secret sharing-based authentication and key agreement protocol for machine-type communications by Ana Paula G Lopes, Lucas O Hilgert, Paulo RL Gondim, Jaime Lloret

    Published 2019-04-01
    “…The comparisons regard security properties and computational and communication costs. …”
    Get full text
    Article
  17. 3957

    Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks by Ching-Nung Yang, Ting-Song Gu, Jhou-Cian You, Chang-Ji Wang

    Published 2024-12-01
    “…Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. …”
    Get full text
    Article
  18. 3958

    Research on Indoor Positioning Systems and Autonomous Mechatronic Systems for Surveillance of Intrabuilding Zones by Alexandru Vlăsceanu, Mihai Avram, Victor Constantin, Edgar Moraru

    Published 2025-01-01
    “…Given increasingly complex threats, adapting surveillance approaches to meet the necessary security levels is essential. The aim of this paper is to develop a surveillance architecture based on autonomous mechatronic systems (mobile robots and drones) designed to secure areas of strategic interest, covering a predefined space while providing enhanced security at minimal costs. …”
    Get full text
    Article
  19. 3959

    A Novel Image Encryption Scheme Based on PWLCM and Standard Map by Yucheng Chen, Chunming Tang, Zongxiang Yi

    Published 2020-01-01
    “…Consequently, a good trade-off efficiency and security can be achieved. Furthermore, the numerical simulations and performance analyses illustrate that the proposed encryption scheme can be used in practical application scenarios requiring lightweight security.…”
    Get full text
    Article
  20. 3960

    Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks by Hongxia Wang, Bangxu Yin

    Published 2013-04-01
    “…Image authentication is critical for secure image transmission and storage in a wireless multimedia sensor network (WMSN). …”
    Get full text
    Article