Showing 4,001 - 4,020 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 4001

    Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm by Wei LI, Menglin WANG, Dawu GU, Jiayao LI, Tianpei CAI, Guangwei XU

    Published 2021-03-01
    “…The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parzen-HW、MLE-HE、HW-HE and HW-MLE-HE.Among them, the novel proposed distinguishers of MLE-HE、HW-HE and HW-MLE-HE can effectively reduce the faults and improve the attack efficiency in simulating experiments.It provides a significant reference for analyzing the security of lightweight ciphers in the Internet of Things.…”
    Get full text
    Article
  2. 4002

    Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach by Zhi-geng HAN, Geng CHEN, Jun-zhou LUO

    Published 2012-11-01
    “…Follow with the methodology of reverse engineering,an exploratory modeling and analysis of security of the typical Kremer-Markowitch multi-party non-repudiation protocol were carried out with a novel method named extended-CSP approach which had been proposed for two-party non-repudiation protocol in preliminary work.With the analysis,the inherent fact that this protocol statisfies not timeliness but non-repudiality and fairness was found successfully.The result of the analysis indicates that,as applying to two-party non-repudiation protocols,the extended-CSP approach can also be a new method for security verification of multi-repudiation protocols.…”
    Get full text
    Article
  3. 4003

    Scheme of node identify authentication in distributed file interaction system by Wen-cai HE, Min DU, Zhi-wei CHEN, Pei-he LIU, Yan-yan HAN

    Published 2013-08-01
    “…Advantages of the novel project are to produce fair session key to both communications, and design the two different types of authentication:within the network and across a network authentication. Then the security of this scheme was analyzed. The scheme is more secure than the former ones and it can protect the privacy of users and non-repudiation, and has lower computa-tional cost. …”
    Get full text
    Article
  4. 4004

    Hierarchical certificateless authenticated key agreement protocol by Hang SU, Jian-wei LIU, Rui TAO

    Published 2016-07-01
    “…A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption. …”
    Get full text
    Article
  5. 4005

    An Image Sharing Encryption Management System For Kabale University. by Bemera, Rauben

    Published 2024
    “…Information security has been the most common word uttered by any man any device or any peripheral for the past two centuries. …”
    Get full text
    Thesis
  6. 4006
  7. 4007
  8. 4008
  9. 4009

    Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok) by Ahmad Fajri

    Published 2019-12-01
    “…In this study, we conducted an audit of the security of wifi networks in Depok City by conducting field studies on the performance and security of wifi networks using wardriving techniques.This study covers about 536 wifi networks on Margonda Street Depok. …”
    Get full text
    Article
  10. 4010
  11. 4011

    Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform by Dekai Li, Yen‐wei Chen, Jingbing Li, Lei Cao, Uzair Aslam Bhatti, Pengju Zhang

    Published 2022-11-01
    “…Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
    Get full text
    Article
  12. 4012

    Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations by Xinsheng Li, Zhilong Xie, Jiang Wu, Taiyong Li

    Published 2019-01-01
    “…And hence how to enhance the security of images has become a hot topic in the field of information security. …”
    Get full text
    Article
  13. 4013

    Resilient Privacy Preservation Through a Presumed Secrecy Mechanism for Mobility and Localization in Intelligent Transportation Systems by Meshari D. Alanazi, Mohammed Albekairi, Ghulam Abbas, Turki M. Alanazi, Khaled Kaaniche, Gehan Elsayed, Paolo Mercorelli

    Published 2024-12-01
    “…The empirical results indicate a 25% reduction in computational overhead and a 30% enhancement in privacy protection over conventional methods, demonstrating the model’s efficacy in secure ITS communication. Compared with existing methods, the proposed approach decreases security depletion rates by 15% across varying traffic densities, underscoring ITS resilience in high-interaction scenarios.…”
    Get full text
    Article
  14. 4014

    Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding by Jingru Sun, Mu Peng, Fang Liu, Cong Tang

    Published 2020-01-01
    “…As computational ghost imaging is widely used in the military, radar, and other fields, its security and efficiency became more and more important. …”
    Get full text
    Article
  15. 4015

    Integration of National Chemical Hazards Monitoring, Total Diet Study, and Human Biomonitoring Programmes for Food Safety Exposure Assessment in Singapore by Angela Li, Jun Cheng Er, Wei Ching Khor, Mei Hui Liu, Valerie Sin, Sheot Harn Chan, Kyaw Thu Aung

    Published 2025-01-01
    “…Food safety and food security can impact the quality of human life, and these two aspects are interrelated alongside many influencing external factors. …”
    Get full text
    Article
  16. 4016

    Police Powers and Commitments in Controlling Violence arising from Assemblies: A Comparative Study of Iranian Law and International Human Rights Law by Mehrdad Ganjali Darani, Sattar Azizi, Shahram Zarneshan

    Published 2024-06-01
    “…The peaceful holding of rallies and the important role played by the police and other security forces in securing them are among the important issues that need to be addressed. …”
    Get full text
    Article
  17. 4017

    Legislation and Policy Capacities in Agricultural Water for Adapting to Climate Change in Iran by N. Heydari, M. Mumtaz, F. Taran

    Published 2025-07-01
    “…Iran has taken various initiatives, enacting related laws and establishing policy measures, to respond to water scarcity and food security in the agricultural sector. This study was conducted to understand and explore Iran’s initiatives, especially through legislation and policy responses, to address water scarcity and food security under CC conditions. …”
    Get full text
    Article
  18. 4018

    Integrated Dairy Production and Cattle Healthcare Management Using Blockchain NFTs and Smart Contracts by Saravanan Krishnan, Lakshmi Prabha Ganesan

    Published 2025-01-01
    “…Efficient cattle healthcare management is vital for ensuring productivity and welfare in dairy production, yet traditional record-keeping methods often lack transparency, security, and efficiency, leading to challenges in livestock product quality and healthcare. …”
    Get full text
    Article
  19. 4019
  20. 4020