Showing 4,081 - 4,100 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4081

    Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System by Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju

    Published 2018-01-01
    “…Cross-site scripting (XSS) is a form of web security attack which involves the injection of malicious codes into web applications from untrusted sources. …”
    Get full text
    Article
  2. 4082

    A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices by Chorng-Shiuh Koong, Tzu-I Yang, Chien-Chao Tseng

    Published 2014-01-01
    “…Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. …”
    Get full text
    Article
  3. 4083

    On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas by Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

    Published 2013-08-01
    “…The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. …”
    Get full text
    Article
  4. 4084
  5. 4085

    Deploying the Qline System for a QKD Metropolitan Network on the Berlin OpenQKD Testbed by Matheus Sena, Georg Harder, Ronny Doring, Ralf-Peter Braun, Michaela Ritter, Oliver Holschke, Marc Kaplan, Marc Geitz

    Published 2025-01-01
    “…Quantum Key Distribution (QKD) systems have the potential to provide secure communication by offering unconditionally secure key exchange between distant parties. …”
    Get full text
    Article
  6. 4086

    Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal by Lina Sofía Cardona Martínez, Cesar Andrés Sandoval Muñoz, Ricardo Salazar-Cabrera, Álvaro Pachón de la Cruz, Juan Manuel Madrid Molina

    Published 2025-01-01
    “…This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. …”
    Get full text
    Article
  7. 4087

    Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics by Hayam Alamro, Mohammed Maray, Jawhara Aljabri, Saad Alahmari, Monir Abdullah, Jehad Saad Alqurni, Faiz Abdullah Alotaibi, Abdelmoneim Ali Mohamed

    Published 2025-02-01
    “…Security in the Internet of Things (IoT)-consumer electronics is decisive in safeguarding connected devices from possible vulnerabilities and threats. …”
    Get full text
    Article
  8. 4088

    Design and Implementation of Global Flight Tracking System Based on Space-Based Network by Bin LUO, Junjie CHEN, Kai CUI

    Published 2020-12-01
    “…Based on the analysis of the application scenarios and requirements of the global fl ight tracking of space-based network, aim at the application characteristics of the satellite network in the field of civil aviation, the overall system and subsystem preliminary design, key technology analysis, business focus and difficulty analysis were carried out, the global flight tracking prototype system construction and test verifi cation was completed.The results showed that the system is stable and reliable, the fl ight path is complete, and meets the requirements of 4D/15 fl ight tracking and surveillance.The future application in the industry will play an important role in improving the aviation security system, and ensuring the information and data security of civil aviation.…”
    Get full text
    Article
  9. 4089

    DNS log analysis system based on big data fusion algorithm by Ming LIAO, Ming CHEN, Ji ZHOU, Xiaohua XIANG, Fang LI, Yefen JIAO

    Published 2019-05-01
    “…The existing problems of big data analysis of DNS logs in the current industry were summarized,and a DNS log analysis system based on big data fusion algorithm was designed.The system integrates six information databases,such as record information database,website database,domain name database,IP address database,CNAME domain name database and security information database.It has powerful log analysis performance,comprehensive content analysis,and classification.With high analysis depth and flexible report customization function,it can provide decision-making basis for telecom operators to improve the management efficiency,optimize network security and enhance the network rate.…”
    Get full text
    Article
  10. 4090

    Survey on trusted cloud platform technology by Xinfeng HE, Junfeng TIAN, Fanming LIU

    Published 2019-02-01
    “…Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed.…”
    Get full text
    Article
  11. 4091

    Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU

    Published 2016-06-01
    “…To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was proposed.Furthermore,the security of the scheme in the random oracle was based on the computational Diffie-Hellman assumption and elliptic curve discrete logarithm assumption was proved.Meanwhile,the scheme was free from certificate management center and needed no bilinear paring operation in both signcryption and decryption phases.It can also protect both the sender and receivers’identity from leaking out.So the scheme can be applied conveniently to broadcast signcryption in network environment.…”
    Get full text
    Article
  12. 4092

    Evaluating NATO Enlargement: From Cold War Victory to the Russia-Ukraine War, edited by James Goldgeier, and Joshua R. Itzkowitz Shifrinson. Palgrave Macmillan, Cham, 2023. XVII, 6... by Svetlana Jilavyan, Magda Arsenyan

    Published 2024-12-01
    “…The book analyzes the challenges of democratizing political regimes from the perspective of political security, including the full-scale Russian-Ukrainian war of 2022. …”
    Get full text
    Article
  13. 4093

    Approach on runtime monitoring based on the embedded trusted platforms by Zhao-chang SUN, Jian-feng MA, Cong SUN, Di LU

    Published 2017-10-01
    “…The state-of-art trusted computing platforms fall short of monitoring its own runtime security properties.In order to mitigate these problems,an approach on runtime monitoring for the embedded trusted platforms was proposed.With the automated code instrumentation and the runtime monitoring,that the runtime security functionalities were consistent with the design specifications of trusted computing platforms could be made sure.The system performance and states meet specific constraints could also be ensured.The runtime exceptions on the specific properties were handled in real-time.The experimental results show that with the increase on the number of monitoring nodes,the precision and real-time performance of proposed runtime monitoring increase.Meanwhile,the costs on the monitoring and the exception handling are moderate.…”
    Get full text
    Article
  14. 4094

    Study on dynamic trust metric of trusted network based on state and behavior associated by LI Dao-feng, YANG Yi-xian, GU Li-ze, SUN Bin

    Published 2010-01-01
    “…Intergrated the factors that state and behavior of entities,a new dynamic trust model of trusted network was proposed.The trust information was obtained through the associated analysis of state and behavior of entities.The rela-tion of trust,state and behavior of the entities was also studied,and a new dynamic trust measurement of trusted network was proposed.The simulation results show that the new trust model has advantages in providing real-time dynamic trust.It is highly effective in countering malicious entities regarding strategic altering behavior and malicious attack,presenting better choice in task assignment in the network,providing help to make the secure police for the network security,and enhancing trustworthily of network.…”
    Get full text
    Article
  15. 4095

    Devlet-içi Çatışmalarda Üçüncü Taraf Aktörler: Suriye İç Savaşında Türkiye’nin Rolü by Fatma Anıl ÖZTOP

    Published 2019-12-01
    “…The aim of this study is to reveal how decisive the perception of national security is to Turkey's existing or prospective intervention, and to what extent this situation contributes to the behavior and methods of other actors, who are involved in the conflict. …”
    Get full text
    Article
  16. 4096

    The "one-group-one-cipher" cryptograph of block-cipher based on chaotic by XUAN Lei1, YAN Ji-ning1

    Published 2009-01-01
    “…The"one-group-one-cipher"algorithm used the sequence from chaotic mapping as sub-key for block cipher was presented to solve the problem of weak keys existing in currently combined cipher algorithms.The randomness of abstracted key sequence was validated in aspects of Shannon entropy.The"one-group-one-cipher"algorithm was de-signed and implemented based on hyper-chaos generalized Hénon mapping and IDEA algorithms, and its security was analyzed theoretically.Analysis shows that the algorithm is so secure that it can withstand brute force attack, and it was perfect secrecy.The disadvantages of key’s reuse of block ciphers are avoided, and the practicality and feasibility of chaos ciphers and one-time pad are improved.…”
    Get full text
    Article
  17. 4097

    Tripartite authenticated key exchange protocol for smart grid by Shengbao WANG, Xin ZHOU, Kang WEN, Bosen WENG

    Published 2023-02-01
    “…Most of the existing authentication schemes in the smart grid environment have the drawbacks of requiring manual participation or low performance, and thus do not meet the practical needs of smart grids.A new tripartite authenticated key exchange protocol was proposed for authentication and key establishment between three parties: smart meters, service providers and control center.The protocol was based on a physical unclonable function, which removed the drawback of requiring manual participation in the operation of the protocol.The security of the protocol was demonstrated by combining BAN logic and non-formal analysis methods.Comparing with similar representative protocols, the proposed protocol has better security and higher efficiency.…”
    Get full text
    Article
  18. 4098

    Study of CABAC-based digital video encryption in the H.264/AVC standard by BAO Xian-yu1, JIANG Jian-guo1.2, YUAN Wei1, LI Yuan1

    Published 2007-01-01
    “…Several candidate domains were analyzed and summarized to apply encryption to the latest video coding standard H.264/AVC,and a novel digital video encryption scheme based on CABAC(context-based adaptive binary arithmetic coding) was proposed.During the CABAC encoding,two kinds of secure encryption operations including RCME(regular coding mode encryption) and BCME(bypass coding mode encryption) were utilized,in order to encrypt residual coefficient codeword,motion vector difference codeword and intra-prediction mode,respectively.The experimental results show that the scheme has significant advantages on security,coding efficiency,and errors robustness.…”
    Get full text
    Article
  19. 4099

    RESEARCH OF FINITE ELEMENT SIMULATION AND TEST ABOUT PV MODULE WITH DIFFERENT FIXED SPACING by WANG Xiaofeng, YANG Fan, YOU Ying

    Published 2018-01-01
    “…The model which can make a security assessment of the mechanical and electrical properties about PV module is significant for security and cost control of project.…”
    Get full text
    Article
  20. 4100

    Certificateless-based efficient aggregate signature scheme with universal designated verifier by Yu-lei ZHANG, Dong-rui ZHOU, Chen-yi LI, Yong-jie ZHANG, Cai-fen WANG

    Published 2015-02-01
    “…The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the random oracle mode,based on the hardness of the computational Diffie-Hellman problem,the new scheme was proved to be secure against three attacks of certificateless aggregate signature scheme with universal designated verifier.Meanwhile,the scheme satisfies properties of strong designated verify and non-transferability.Furthermore,the length of final aggregate signature is equivalent as the length of signal user’s signature,it is more efficient than others because the pairing computation is fixed among public verifies and designed verifies.…”
    Get full text
    Article