Showing 3,961 - 3,980 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 3961

    Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks by LIU Jie, FAN Xinyue, HE Jiahui

    Published 2024-09-01
    “…To address the issue of message confidentiality in certificateless signature schemes and the shortcomings of most signcryption schemes, such as incomplete security functions and low efficiency, a certificateless aggregate signcryption scheme based on elliptic curve encryption technology was proposed for vehicle-to-grid (V2G) networks. …”
    Get full text
    Article
  2. 3962
  3. 3963
  4. 3964

    Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network by Yang Wu, Yongmei Sun, Lei Zhan, Yuefeng Ji

    Published 2013-06-01
    “…The services in BAN usually have a high requirement on security, especially for the medical diagnosis, which involves private information. …”
    Get full text
    Article
  5. 3965

    Pairing-free certificateless blockchain-based access authentication method for spatial information network by HUO Ru, WANG Zhihao, SHAO Zihao, HUANG Tao

    Published 2024-08-01
    “…Finally, the access authentication list was recorded through the extended block structure, and the batch verification mechanism was designed to achieve efficient handover. Security analysis and simulation results show that, compared with existing methods, the proposed method reduces the signaling overhead by about 50%, the authentication delay by at least 12.4%, and the batch authentication delay by about 23%, while providing stronger security guarantees.…”
    Get full text
    Article
  6. 3966
  7. 3967

    Kjøpesentervakthold: Privatisering av kontroll? by Mette Irmgard Snertingdal

    Published 2002-06-01
    “…This article examines the extent to which private security has taken over police work. Shopping centers provide a particularly useful setting for the discussion of privatisation of control. …”
    Get full text
    Article
  8. 3968

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. …”
    Get full text
    Article
  9. 3969

    Proxy re-encryption based multi-factor access control scheme in cloud by Mang SU, Guozhen SHI, Anmin FU, Yan YU, Wei JIN

    Published 2018-02-01
    “…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
    Get full text
    Article
  10. 3970

    Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology by Ruijin WANG, Yucheng TANG, Weiqi ZHANG, Fengli ZHANG

    Published 2020-02-01
    “…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
    Get full text
    Article
  11. 3971

    Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems by Shiyong Zhang, Gongliang Chen

    Published 2017-02-01
    “…Mathematical analysis shows that using Micro-Trivium is as secure as using Trivium.…”
    Get full text
    Article
  12. 3972

    Cooperation-based location authentication scheme for crowdsensing applications by Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG

    Published 2022-09-01
    “…Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this, a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly, users with mobile devices were used to generate location proofs for each other, and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number, which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition, a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile, the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally, security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure, and the advantages in computational cost and communication overhead.…”
    Get full text
    Article
  13. 3973
  14. 3974

    A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection by Sascha Mühlbach, Andreas Koch

    Published 2012-01-01
    “…Malicious software has become a major threat to computer users on the Internet today. Security researchers need to gather and analyze large sample sets to develop effective countermeasures. …”
    Get full text
    Article
  15. 3975

    Intelligent operation and maintenance of power communication network based on data perception fusion by Huahui LYU, Zhe MING, Kai FAN, Qingming CHEN, Hongyu SHI, Wenjing ZOU, Dingbo WANG, Shengtao GUAN, Yong WU

    Published 2024-01-01
    “…Under the common influence of multiple factors and structural complexity in the power communication network, traditional operation and maintenance methods are vulnerable to the disturbance of abnormal voltage signal and abnormal transformer signal in the perception process, resulting in the global perception of the network and seriously affecting the overall operation and maintenance effect.In order to effectively solve the problem of perception bias caused by multiple factors, the data perception fusion algorithm was used to optimize the perception of the power parameters under the power communication network, so as to realize the effect of improving the perception accuracy and optimizing the overall quality of operation and maintenance.In the optimization scheme, the situational awareness scope of power communication network security was determined firstly.Secondly, the situational awareness of voltage security under power communication network operation was optimized.Thirdly, the security situational awareness parameters of power network transformer were defined based on the data perception fusion algorithm.Finally, the data perception fusion calculation of perception information was completed.The simulation comparison test shows that the data perception fusion algorithm has the ability to improve the overall quality of operation and maintenance, reduce the perception deviation in the process of operation and maintenance, and improve the perception sensitivity and accuracy.…”
    Get full text
    Article
  16. 3976
  17. 3977

    Blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics by Chuntang YU, Zhigeng HAN, Zhiyuan LI, Liangmin WANG

    Published 2020-06-01
    “…In view of the security threats such as forgery,deception,privacy disclosure and non-traceability caused by the lack of transaction supervision for crowdsourcing logistics in the modern service industry,a blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics was proposed.Firstly,the framework adopted the two-stage supervision system:one was the National Authorized Certification Center for the supervision of logistics service platform,the other was the logistics service platform for the supervision of crowdsourcing logistics participation.Later,under the framework of the supervision system,the functions of crowd contract,legal and anonymous identity authentication,intelligent transaction matching,anomaly data analysis and detection,privacy protection and traceability were realized.Then,through the security analysis and transaction supervision component software,the security controllability and operational efficiency of the transaction supervision architecture were verified.Finally,the software component was run on the real crowdsourcing logistics enterprise platform for the actual measurement.The measurement results show that the proposed hierarchical and multi-level smart service transaction supervision framework is safe and controllable.The framework can protect the privacy of users and data,prevent forgery and deception,and realize the auditability and traceability of behaviors and data of users.…”
    Get full text
    Article
  18. 3978

    Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation by Musheer Ahmad, Eesa Al-Solami

    Published 2020-01-01
    “…The standard set of performance parameters such as nonlinearity, strict avalanche criterion, bits independent criterion, differential uniformity, and linear approximation probability is quantified to assess the security and robustness of proposed S-box. The simulation and comparison results demonstrate the effectiveness of proposed method for the construction of cryptographically sound S-boxes.…”
    Get full text
    Article
  19. 3979
  20. 3980