Showing 4,041 - 4,060 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4041
  2. 4042

    Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks by Ling Chi, Liang Hu, Hongtu Li, Jianfeng Chu

    Published 2014-03-01
    “…Another is using the Hardware Security Module. After a simple analysis, we have proved that the improved scheme can resist the collusion attack.…”
    Get full text
    Article
  3. 4043

    Discrete event simulation–based energy efficient path determination scheme for probabilistic voting–based filtering scheme in sensor networks by Su Man Nam, Tae Ho Cho

    Published 2020-08-01
    “…Several en-route filtering schemes mainly focus on saving energy through early detection of false data within a short distance against these attacks; however, they cannot immediately block the false data injected by compromised nodes. A security scheme uses context-aware architecture for a probabilistic voting–based filtering scheme to detect the compromised nodes and block the injection of false data, unlike security protocols. …”
    Get full text
    Article
  4. 4044

    Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos by Yuzhuo Zhao, Qiqin Shi, Qun Ding

    Published 2025-01-01
    “…Through our comprehensive security analysis, we found a security vulnerability in the mechanism of the association between the key and plaintext and proposed a breaking scheme. …”
    Get full text
    Article
  5. 4045

    The Dynamics of Village Treasury Land Management to Provide Legal Certainty and Benefits by Imam Ropii, Febry Chrisdanty, Ariska Cesar Divian Candra Kusuma

    Published 2024-12-01
    “…The management of village treasury land in Sukolilo Village faces various challenges that deviate from the provisions, especially related to the issue of securing and utilizing village assets. This study aims to examine legal management such as securing and utilizing village treasury land in Sukolilo Village in order to provide legal certainty and benefits for the community. …”
    Get full text
    Article
  6. 4046
  7. 4047
  8. 4048

    A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things by Lanka Chris Sejaphala, Vusimuzi Malele, Francis Lugayizi

    Published 2025-01-01
    “…In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. …”
    Get full text
    Article
  9. 4049

    Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks by Renjian Feng, Shenyun Che, Xiao Wang, Ning Yu

    Published 2013-06-01
    “…Trust management scheme has been regarded as a powerful tool to defend against the wide set of security attacks and identify malicious nodes. In this paper, we propose a trust management scheme based on revised Dempster-Shafer (D-S) evidence theory. …”
    Get full text
    Article
  10. 4050

    Digital Transformation: A Case Study of a Legal Firm in Sri Lanka and Its Impact by Dulanjani Dissanayake, Kajini Pasadika Hapuarachchi Hapuarachchige, Yogesh Jindal

    Published 2024-08-01
    “…Saram company’s manual practices, which hinder its operational effectiveness and adaptability in the contemporary legal landscape, where quick and secure access to information is pivotal. We have adopted TAM as the theoretical framework for this research. …”
    Get full text
    Article
  11. 4051
  12. 4052

    DAG-Based Swarm Learning Approach in Healthcare: A Survey by David Gana, Faisal Jamil

    Published 2025-01-01
    “…Blockchain’s innovative consensus mechanisms and secure data flow systems offer encouraging solutions to crucial issues in healthcare data management and security. …”
    Get full text
    Article
  13. 4053

    Regulatory and policy analysis of employment and health protections in Indonesia’s creative economy by Afrilies Marlia Hafny, Naili Yuris Tri, Lina Angie Angel

    Published 2025-01-01
    “…Using a normative legal research method, this study analyzes key legal frameworks, including laws related to manpower, social security, and creative economy regulations, to assess the extent to which existing policies address labor and health protection in the digital era. …”
    Get full text
    Article
  14. 4054

    Wi-Pest:a method for detecting stored grain pests based on CSI by Shaowei SHAN, Weidong YANG, Le XIAO, Ke WANG

    Published 2020-12-01
    “…The environmental and biological factors that affect the food security during the food storage,such as the food temperature,environment humidity,moisture,gas,mildew,pests and others pose a threat to the food storage security,among which the pest is an important factor threatening food storage security.Therefore,a fast and effective detection method is needed to detect stored grain pests.Some of the existing methods are time consuming,using expensive equipment,potentially harmful to health and inefficient.A non-contact,fast and low-cost detection method for stored grain pests based on the amplitude of the channel state information (CSI) was proposed,namely,wireless-pest (Wi-Pest).The feasibility of the pest detection in the stored grain was verified by using CSI amplitude data.On this basis,a Wi-Pest detection method was designed.Firstly,the amplitude data of CSI was preprocessed by outliers removal,data normalization and noise elimination.Then the principal component analysis (PCA) was used to compress the data and extract the main feature components.Finally,random forest (RF) classification method was used to detect stored grain pests.Experiments show that the abnormal density of live pests in grain heaps can be detected under the line of sight (LOS) scenario,and the detection accuracy of the proposed method can reach 97% on average.…”
    Get full text
    Article
  15. 4055

    Digital Identities in The Context of Blockchain and Artificial Intelligence by Sevgi Kavut

    Published 2021-04-01
    “…Moreover, digital identity got more secure thanks to blockchain systems while digital identities is defined more quickly and easily by means of developed technologies with artificial intelligence…”
    Get full text
    Article
  16. 4056

    EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM by T Devapriya, V Ganesan, S Velmurugan

    Published 2024-12-01
    “…The objective is to provide a dependable, scalable, and energy-efficient solution for WSN security. This will ensure that data remains intact and that rogue nodes cannot disrupt the network. …”
    Get full text
    Article
  17. 4057

    BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption by Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO

    Published 2022-09-01
    “…Current electronic voting systems mostly relied on central server and the trusted third party, this kind system architecture increases the security risks of voting, and even makes voting fail.In order to solve this issue, an electronic voting system BFV-blockchainvoting that supported BFV homomorphic encryption was proposed, and this system applied the blockchain technology to the electronic voting system to replace the trusted third party.Firstly, an open and transparent bulletin board was used to record the vote information, and an intelligent contract was used to realize the functions of verification and self counting.Secondly, in order to further improve the security and reliability of the voting process, the voter’s registration information was signed by SM2 signature algorithm, the ballot was managed by both parties that can supervise each other, and the counting data was encrypted by the BFV full homomorphic encryption algorithm.Finally, the evaluation of performance shows that it only costs 1.69 ms to complete one ballot in the proposed electronic voting system.This electronic voting scheme based on the BFV full homomorphic encryption and blockchain has better security attributes such as manipulation-resistance, anonymity, verifiability, double-voting resistance, coercion-resistance and resistance to quantum attacks.The scheme is suitable for a variety of voting scenarios and can meet the efficiency requirements in large voting scenarios.…”
    Get full text
    Article
  18. 4058

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  19. 4059

    Research on the integration path of physical training and police practical skills in police academy by Yun Chen

    Published 2025-01-01
    “… With the increasingly complex social security environment, public security education is facing higher requirements, especially in training high-quality law enforcement personnel to adapt to the complex police environment, how to optimize the training system has become a key issue. …”
    Get full text
    Article
  20. 4060