Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4101
A video encryption in HEVC entropy coding based on magic square
Published 2018-03-01“…In view of the multimedia information security,based on the entropy module on high efficiency video coding (HEVC/H.265),combined with the magic square,a real time and high efficiency encryption technique for high-definition video streaming was proposed.The algorithm which had an effective use of transform coefficient sparsity enabled coefficient group (CG) of transform block (TB) scrambling,and used a selective encryption on syntax elements in CG's entropy.The experiments prove that the investigated scheme has high security,which can guarantee the standard compliance and the demand of video encryption while having a low impact on encoding-rate performance.…”
Get full text
Article -
4102
3-subset meet-in-the-middle attack on block cipher TWIS
Published 2014-06-01“…To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening. …”
Get full text
Article -
4103
Regulation and Compliance in Telemedicine: Viewpoint
Published 2025-01-01“…We conclude that simplified policies are needed to keep telemedicine accessible to providers and patients and that current privacy and security measures need refinement to protect patients appropriately.…”
Get full text
Article -
4104
Analysis and improvement of an identity-based signature scheme from lattices
Published 2015-05-01“…Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove the strong unforgeability under selective identity and adaptive chosen-message attacks.Then,using Boyen signing technique (PKC 2010) inpoves the signing algorithm,and proves the strong unforgeability under selective identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model.In addition,it com-pares the efficiency and security of the scheme and the other identity-based signatures from lattices.…”
Get full text
Article -
4105
Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems
Published 2015-11-01“…In this paper, we propose a robust distributed reprogramming protocol of WSNs for healthcare systems, in which the security requirements are proved to be secure based on the elliptic curve discrete logarithm problem, such as existential unforgeability of signature for code image, authenticity of code image, freshness, and node compromised tolerance.…”
Get full text
Article -
4106
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01“…The security of existing identity-based threshold proxy signature schemes were almost proven in the random oracle model,and each proxy signer’s proxy signature key was fixed in the valid period.A(t,n) ID-based proactive threshold proxy signature scheme(IBTPTS) was presented by using the publicly verifiable secret sharing technology,based on existential identity-based signature scheme.The scheme was proved to be safe in the standard model.Each proxy signer’s proxy signature key can be updated regularly,and proxy signature verifying procedure only needs const bi-linear pairings.Therefore the scheme has better dynamic security and higher efficiency.…”
Get full text
Article -
4107
Tag's ownership transfer protocol based on quadratic residue
Published 2018-03-01“…A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.…”
Get full text
Article -
4108
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01“…A cryptographically-implemented high-speed source address verification scheme for the hosts in the IPv6 access subnet was proposed.The MAC address was used as the identity of the host machine and bounded with the host’s public key.Then the IPv6 address was derived from the host machine’s public key using the cryptographically generated address algorithm.The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm and stream authentication.The experimental system show that the scheme could ver fy the source addresses of data packets at a loss cost.Thus,it is a secure and feasible scheme.…”
Get full text
Article -
4109
ALTERNATIVE SETTLEMENT SYSTEM IN THE FUEL AND ENERGY COMPLEX: CLASSIFICATION AND MAIN FEATURES
Published 2016-07-01“…Marks need of increase of economic security and marked out threats to the Russian economy from «petrodollars». …”
Get full text
Article -
4110
Health and Environmental Impact of Hospital Wastes: Systematic Review
Published 2023-03-01Get full text
Article -
4111
Enhancing satellite-based emergency mapping: Identifying wildfires through geo-social media analysis
Published 2025-01-01Get full text
Article -
4112
PREVALENCE AND CONSEQUENCES OF KIDNAPPING IN SOUTHERN TARABA STATE, NIGERIA
Published 2021-05-01“… Kidnapping is one of the security challenges Nigeria is faced with and Taraba State is not an exception. …”
Get full text
Article -
4113
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm
Published 2016-08-01Get full text
Article -
4114
Development and evaluation of a low-cost database solution for the Community Paramedicine at Clinic (CP@clinic) database.
Published 2024-12-01“…The aim of this project is to design a low-cost, portable, secure, user-friendly database for CP@clinic sessions and pilot test the database with paramedics and older adult volunteers. …”
Get full text
Article -
4115
Optimizing PoS agent banking for inclusive rural economies:
Published 2024-12-01“…However, the success of PoS banking is hindered by cybersecurity risks, fraud, agent credibility issues, and physical security threats like robbery. Possible interventions include strengthening agent registration, raising public awareness, enhancing digital security protocols, and bolstering regulatory and law enforcement frameworks. …”
Get full text
Article -
4116
Automatic speech recognition predicts contemporaneous earthquake fault displacement
Published 2025-01-01Get full text
Article -
4117
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present, dynamic searchable encryption schemes are mostly based on symmetric searchable encryption, which need to establish a secure key sharing channel in advance, and cannot be directly applied to data sharing in cloud storage scenarios.For the secure sharing scenario of multi-party data in cloud storage, a dynamic multi-keyword searchable encryption scheme was proposed.The forward index was constructed by a cuckoo filter to enable data owners to perform documents and index dynamic updates.The conjunctive multi-keywords search was supported by combining bilinear pairing with Lagrangian interpolation polynomials.To reduce the computational overhead in the ciphertext retrieval phase, a combination of inverted index and forward index was constructed to improve the retrieval efficiency of cloud server.This scheme is provably secure with the indistinguishability in adaptively chosen keyword attack under decision linear Diffie-Hellman problem.Simulation experiments were conducted to analyze the execution efficiency of the scheme for keyword search and index update in different datasets.The results show that the scheme effectively avoids the linear correlation between the retrieval time and the number of ciphertexts, and reduces the computational overhead in the update operation with a large amount of data.…”
Get full text
Article -
4118
Basic principles of Russian foreign policy under Vladimir Putin
Published 2020-12-01“…The article notes the multi-vector nature of Russia's foreign policy strategy aimed at developing multilateral interstate relations, achieving peace and security in the interstate arena, actively countering modern challenges and threats to interstate security, as well as the formation of a multipolar world. …”
Get full text
Article -
4119
Research on mimic decision method based on deep learning
Published 2024-02-01“…Due to software and hardware differentiation, the problem of false positives mistakenly identified as network attack behavior caused by inconsistent mimic decision results frequently occurs.Therefore, a mimic decision method based on deep learning was proposed.By constructing an unsupervised autoencoder-decoder deep learning model, the deep semantic features of diverse normal response data were explored from different executions and its statistical rules were analyzed and summarized.Additionally, the offline learning-online decision-making mechanism and the feedback optimization mechanism were designed to solve false positive problem, thereby accurately detecting network attacks and improving target system security resilience.Since statistical rules of normal response data was understood and mastered by deep learning model, the mimic decision results among different executions could remain consistent, indicating that the target system was in a secure state.However, once the target system was subjected to a network attacks, the response data outputted by the different executions was deviated from statistical distribution of deep learning model.Therefore, inconsistent mimic decision results were presented, indicating that the affected execution was under attack and the target system was exposed to potential security threats.The experiments show that the performance of the proposed method is significantly superior to the popular mimic decision methods, and the average prediction accuracy is improved by 14.89%, which is conducive to integrating the method into the mimic transformation of real application to enhance the system’s defensive capability.…”
Get full text
Article -
4120
Encrypted Search Method for Cloud Computing Data Under Attack Based on TF-IDF and Apriori Algorithm
Published 2025-12-01“…SEMSS uses the Apriori algorithm to mine the co-occurrence relationship between words and find the keyword set that meets the minimum support threshold to improve the recall rate of search results. Finally, the security of the scheme is verified from the aspects of semantic security, effici this paper designsency, data integrity, etc. …”
Get full text
Article