Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3981
Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing
Published 2022-05-01“…Aiming at the problems that the existing compressive sensing-based meaningful image encryption algorithms have low visual security of the encrypted images and poor quality of the reconstructed images, a 2-dimensional compressive sensing-based (2DCS) meaningful image encryption algorithm was proposed.Firstly, a chaotic pseudo-random sequence generation method associated with plaintext was designed, and the global random permutation and grayscale transformation operations were used for pre-encryption to improve the decrypted image quality.The generated pre-encrypted image was used as the input for 2DCS, and the secret image was generated after the compression encryption and quantization operations.Secondly, the relationship between the hidden and the modified data was considered, and an adaptive embedding method was adopted to modify the carrier coefficient values to improve the visual security of meaningful encrypted image.Finally, the 2-dimensional projection gradient reconstruction method was adopted to decompress and decrypt to obtain the decrypted image.The experimental results show that, compared with the existing algorithms, the proposed algorithm not only improves the visual security of encrypted image and the quality of reconstructed image, but also can resist noise and cropping attacks.…”
Get full text
Article -
3982
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Published 2017-05-01“…Based on the study of the traditional attribute-based encryption,a scheme called group-oriented ciphertext-policy attribute-based encryption was proposed.In the scheme,the access policy consists of AND-gate and OR-gate.Users were split up into different groups.Users from the same group can merge their attributes to decrypt successfully,if the union of their attributes satisfies the access structure embedded in the ciphertext.But users from different groups cannot realize this cooperative decryption.A concrete construction and security model was given.Finally,the security proof for the proposed scheme was given.…”
Get full text
Article -
3983
Research and design of multi-tenant scheme for Kubernetes container cloud platform
Published 2020-09-01“…In the container cloud platform,tenants share the underlying computing,storage,network and other resources,and there are problems with the operation of the tenant container and data security.Based on the analysis of Kubernetes scheme based on access control and resource isolation,a multi-tenant cloud platform was proposed,which covers multi-tenancy management model,multi-tenant access control,computing resources isolated and network resources,etc.The proposed model can be practically improving resource isolation capability based on containers of Kubernetes cloud platform,effectively reduce the data security hidden danger.…”
Get full text
Article -
3984
Chaotic hiding and its positive definite blind extraction algorithm of speech signal
Published 2016-08-01“…The wavelet transform was used to extract energy accumulation zone of speech signal hidden in the chaotic carrier signal for transmission,and a blind extraction algorithm was designed to achieve speech signal extraction under different chaotic dynamical systems.Using three different dimensions of the chaotic dynamic system as the background,simulation experiment analysed the performance of the proposed algorithm in aqualitative and quantitative ways,and verified the algorithm's reliability under the noise environment that prove the blind extraction algorithm can be used as an effective method of security verification of chaotic secure communication system.…”
Get full text
Article -
3985
Efficient distributed traffic offloading algorithm based on SDN architecture
Published 2017-06-01“…For addressing the problem of mobile data traffic offloading,network service cost minimization problem model was proposed,which considered the cost of base stations and the consumption of access points under the SDN architecture.Due to the defects of convergence speed and privacy security in the traffic offloading algorithm based on dual decomposition,the traffic offloading algorithm based on proximal Jacobian ADMM was proposed and an implementation scheme to ensure the privacy and security was designed.Meanwhile,the simulation results show that the algorithm based on the proximal Jacobian ADMM is superior to the dual decomposition algorithm in terms of convergence speed.…”
Get full text
Article -
3986
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
Published 2014-02-01“…With the increasing demand for VoIP services, problems are also occurring, namely, security vulnerabilities and degraded service quality. …”
Get full text
Article -
3987
Intelligent terminal identification technology toward 6G
Published 2020-03-01“…The intelligent terminal will greatly expand the applications of 6G .However,it will also make 6G face with greater security threats.The reliable terminal identification technology is the premise to ensure the security of 6G networks.Firstly,based on the network architecture and terminal characteristics,the requirements and challenges of 6G intelligent terminal identification were summarized.Then,the development trend was put forward for 6G intelligent terminal identification.Finally,physical layer authentication was explored to achieve possible realization of intelligent terminal identity authentication mechanism in 6G networks.…”
Get full text
Article -
3988
Machine learning-based authentication of banknotes: a comprehensive analysis
Published 2024-03-01“…Key features, including texture, color distribution, and security attributes, are extracted to train the model, enabling a thorough analysis of banknote authenticity. …”
Get full text
Article -
3989
Short signature based on factoring problem in the standard model
Published 2011-01-01“…A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in this scheme was compromised of one element in,and the public key was short,requir-ing only the modulus N,one element of,one integer and one pseudorandom function seed.Compared with Hohen-berger’s RSA scheme(Crypto 09),the computaional cost of the sign algorithm and verification algorithm in this scheme is also much lower.…”
Get full text
Article -
3990
Private data isolation for OpenSSH based on virtual machines
Published 2009-01-01“…OpenSSH stores keys in the file system.The keys are easy to be exposed while the host has been invaded by illegal users.Methods are needed to protect these important data.For such purpose,virtual machine protection was pro-posed to provide a separate space for storing the important data as well as secure accessing interfaces.By using virtual machine even under the situation that the host is compromised,the important data can still be kept safe.Thus,the safe and separate space provided by virtual machine can protect the keys of OpenSSH securely.…”
Get full text
Article -
3991
A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS
Published 2018-07-01“…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. …”
Get full text
Article -
3992
Certificateless generalized signcryption scheme in the standard model
Published 2017-04-01“…In 2010,Liu,et al.proposed a certificateless signcryption scheme in the standard model,but many analyses revealed that Liu's scheme was insecure in fact.To overcome the disadvantages,the scheme was improved and a certificateless generalized signcryption scheme was constructed.In addition,a formal security model for the proposed scheme against the malicious-but-passive KGC attacks was introduced.Furthermore,the proposed scheme was proven to be secure under the decisional bilinear Diffie-Hellman and the computational Diffie-Hellman intractability assumptions in the standard model.Numerical results illustrate that the proposed algorithm is efficient.…”
Get full text
Article -
3993
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01“…The results indicated the enhanced security performance of the ARDL-FDIAR technique compared to other DL approaches.…”
Get full text
Article -
3994
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01“…An identity-based signature scheme was proposed based on additive elliptic curve group.The verification result of the signature was a constant with respect to the signer’s identity.The scheme could guarantee user anonymity in the process of cross-domain authentication and avoided the pairing operation.Then a cross-domain authentication scheme was constructed by combining the proposed signature scheme.During the authentication,a user constructed the signature of timestamp as authentication proof,which realized secure cross-domain authentication and user anonymity.It is shown that the proposed scheme has superiority in both security and efficiency,and is more suitable for pervasive computing.…”
Get full text
Article -
3995
Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map
Published 2017-01-01“…The obtained simulation results and extensive security analyses demonstrate the high level of security of the algorithm and show its robustness against various types of attacks.…”
Get full text
Article -
3996
Oblivious transfer based on physical unclonable function system
Published 2013-08-01“…Compared with the traditional public key encryption OT scheme, POT protocol does not use any computational assumptions but rather the secure property of PUFS, and thus this scheme needs less computation and communication cost.…”
Get full text
Article -
3997
Research and simulation of timing attacks on ECC
Published 2016-04-01“…Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.…”
Get full text
Article -
3998
Further research on public-key cryptosystems based on third-order recurrence sequence
Published 2005-01-01“…It is further improved to be a probabilistic public-key cryptosystem. Then security analysis of the proposed schemes were provided. …”
Get full text
Article -
3999
Identity authentication scheme of Android client based on identifiers
Published 2017-04-01“…The Android mobile terminal’s own identifier information was used,which was credibly ensured by the Android system,then combining the Hash function and operation such as xor or connection,an algorithm of authentication information generation for the Android client was created.The traditional mobile client’s process of register and login were analyzed,putting the identity information generation and authentication on the sever.A novel authentication scheme was constructed,which made the users free from the cumbersome authentication process and privacy divulges.Finally,the security and efficiency of the scheme were analyzed.The results show that the new scheme has strong security and high convenience.…”
Get full text
Article -
4000
Network layer protocol architecture for many-nets internetworking
Published 2019-10-01“…Based on the analysis of the evolution history of existing network protocol technologies,the innovative guiding principles applicable to the future data network unified protocol system was proposed.By dividing the nature of network functions into the connections between network elements,five areas of protocol innovation such as data plane,control plane,user plane,management control and intrinsic network security were proposed.The implementation and application of the protocol system in many heterogeneous scenario were analyzed.Finally,the rationality of the protocol innovation guidelines was verified by analyzing the protocol innovation process in deterministic network forwarding technology and intrinsic security network technology.…”
Get full text
Article