Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3961
Efficient certificateless aggregate signcryption scheme with conditional privacy protection for V2G networks
Published 2024-09-01“…To address the issue of message confidentiality in certificateless signature schemes and the shortcomings of most signcryption schemes, such as incomplete security functions and low efficiency, a certificateless aggregate signcryption scheme based on elliptic curve encryption technology was proposed for vehicle-to-grid (V2G) networks. …”
Get full text
Article -
3962
-
3963
-
3964
Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network
Published 2013-06-01“…The services in BAN usually have a high requirement on security, especially for the medical diagnosis, which involves private information. …”
Get full text
Article -
3965
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01“…Finally, the access authentication list was recorded through the extended block structure, and the batch verification mechanism was designed to achieve efficient handover. Security analysis and simulation results show that, compared with existing methods, the proposed method reduces the signaling overhead by about 50%, the authentication delay by at least 12.4%, and the batch authentication delay by about 23%, while providing stronger security guarantees.…”
Get full text
Article -
3966
The widening gender wage gap in the gig economy in China: the impact of digitalisation
Published 2024-12-01Get full text
Article -
3967
Kjøpesentervakthold: Privatisering av kontroll?
Published 2002-06-01“…This article examines the extent to which private security has taken over police work. Shopping centers provide a particularly useful setting for the discussion of privatisation of control. …”
Get full text
Article -
3968
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. …”
Get full text
Article -
3969
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01“…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
Get full text
Article -
3970
Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology
Published 2020-02-01“…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
Get full text
Article -
3971
Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems
Published 2017-02-01“…Mathematical analysis shows that using Micro-Trivium is as secure as using Trivium.…”
Get full text
Article -
3972
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01“…Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this, a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly, users with mobile devices were used to generate location proofs for each other, and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number, which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition, a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile, the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally, security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure, and the advantages in computational cost and communication overhead.…”
Get full text
Article -
3973
Seismic Behavior of Short Concrete Columns with Prestressing Steel Wires
Published 2014-01-01Get full text
Article -
3974
A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection
Published 2012-01-01“…Malicious software has become a major threat to computer users on the Internet today. Security researchers need to gather and analyze large sample sets to develop effective countermeasures. …”
Get full text
Article -
3975
Intelligent operation and maintenance of power communication network based on data perception fusion
Published 2024-01-01“…Under the common influence of multiple factors and structural complexity in the power communication network, traditional operation and maintenance methods are vulnerable to the disturbance of abnormal voltage signal and abnormal transformer signal in the perception process, resulting in the global perception of the network and seriously affecting the overall operation and maintenance effect.In order to effectively solve the problem of perception bias caused by multiple factors, the data perception fusion algorithm was used to optimize the perception of the power parameters under the power communication network, so as to realize the effect of improving the perception accuracy and optimizing the overall quality of operation and maintenance.In the optimization scheme, the situational awareness scope of power communication network security was determined firstly.Secondly, the situational awareness of voltage security under power communication network operation was optimized.Thirdly, the security situational awareness parameters of power network transformer were defined based on the data perception fusion algorithm.Finally, the data perception fusion calculation of perception information was completed.The simulation comparison test shows that the data perception fusion algorithm has the ability to improve the overall quality of operation and maintenance, reduce the perception deviation in the process of operation and maintenance, and improve the perception sensitivity and accuracy.…”
Get full text
Article -
3976
Multiple-Model Cardinality Balanced Multitarget Multi-Bernoulli Filter for Tracking Maneuvering Targets
Published 2013-01-01Get full text
Article -
3977
Blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics
Published 2020-06-01“…In view of the security threats such as forgery,deception,privacy disclosure and non-traceability caused by the lack of transaction supervision for crowdsourcing logistics in the modern service industry,a blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics was proposed.Firstly,the framework adopted the two-stage supervision system:one was the National Authorized Certification Center for the supervision of logistics service platform,the other was the logistics service platform for the supervision of crowdsourcing logistics participation.Later,under the framework of the supervision system,the functions of crowd contract,legal and anonymous identity authentication,intelligent transaction matching,anomaly data analysis and detection,privacy protection and traceability were realized.Then,through the security analysis and transaction supervision component software,the security controllability and operational efficiency of the transaction supervision architecture were verified.Finally,the software component was run on the real crowdsourcing logistics enterprise platform for the actual measurement.The measurement results show that the proposed hierarchical and multi-level smart service transaction supervision framework is safe and controllable.The framework can protect the privacy of users and data,prevent forgery and deception,and realize the auditability and traceability of behaviors and data of users.…”
Get full text
Article -
3978
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation
Published 2020-01-01“…The standard set of performance parameters such as nonlinearity, strict avalanche criterion, bits independent criterion, differential uniformity, and linear approximation probability is quantified to assess the security and robustness of proposed S-box. The simulation and comparison results demonstrate the effectiveness of proposed method for the construction of cryptographically sound S-boxes.…”
Get full text
Article -
3979
Norm‐based zeroing neural dynamics for time‐variant non‐linear equations
Published 2024-12-01Get full text
Article -
3980
CONSTRUCTION OF THE FUTURE: THE EXPERIENCE OF PHASED IMPROVEMENT OF ENGINEERING EDUCATION
Published 2017-06-01Get full text
Article