Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4161
Self-healing key distribution scheme of MANET based on sliding window
Published 2009-01-01“…A new self-healing key distribution scheme of MANET based on sliding window was proposed in order to re-duce the burden of manager supervising self-healing MANET and to deal with the scene of some users’ lifetime bestrid-ing two session windows.A dual hash directional key chain model was set up.The model achieves t-revocation capability by using control parameter.Through the security analysis,the model has settled users’ bestriding problem yet still achieved security property.Because manager once distributes initial private information to bestriding user and so avoids distributing it again in rebuilding phase,the model reduces the communication cost.…”
Get full text
Article -
4162
Current Status of Forensic Virtual Autopsy Laboratory Construction in China
Published 2024-12-01“…Several provinces have established virtual autopsy laboratories within their public security system. However, these initiatives face challenges including equipment costs, the needs for technological updates, professional training, and the establishment of regulatory standards. …”
Get full text
Article -
4163
Mimic storage scheme based on regenerated code
Published 2018-04-01“…Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors,which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random,time-varying and dynamic scheme,which increases the uncertainty of storage system.It blocks and interferes with the attack chain,increases the difficulty and cost of the attack operation,and improves the security and reliability of the system.…”
Get full text
Article -
4164
Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis
Published 2024-12-01“…The application of blockchain technology to healthcare offers promise in providing solutions to some key challenges related to data sharing, privacy, security, and access control. There are however several barriers preventing blockchain adoption from spreading widely, which has prompted research efforts. …”
Get full text
Article -
4165
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01“…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
Get full text
Article -
4166
Novel chaotic block encryption scheme for WSN based on dynamic sub key
Published 2017-12-01“…In view of high efficiency and security requirements in WSN encryption algorithm,a lightweight chaotic block encryption algorithm was designed and a novel scheme of dynamic sub keys extension was proposed.To greatly reduce the computing burden of WSN nodes,this scheme made full use of WSN cloud servers monitoring platform,which was powerful in data computing and processing,and transfered the sub keys synchronization task from nodes to cloud servers.Experimental results and performance analysis show that the scheme has good characteristics of diffusion,confusion and statistical balance,strong key security and high algorithm efficiency.It has a good application prospect in the field of WSN communication encryption.…”
Get full text
Article -
4167
Research of discovering vulnerabilities of NFC applications on Android platform
Published 2014-11-01“…To improve the security of NFC technology,a research is done for discovering NDEF vulnerabilities of NFC applications on Android platform,and a method of bug hunting is proposed on based Fuzzing technology.The method adopts manual craft,the generation and the mutation strategies to construct test cases,and uses two assistant means of analyzing and constructing test cases,including reverse message anylysis and packet sniffing.Then,NFC applications’ vulnerabilities with constructed test cases and output results are discovered.According to the method,a system called ANDEFVulFinder is developed for discovering the security vulnerabilities of NFC applications.The tool logcat and process monitoring are used to monitor targets’ exceptions during the discovering process,and the test is automated…”
Get full text
Article -
4168
Urban Terrorism: St. Peter’s Square, Vatican City
Published 2017-02-01“…In the wake of the 2015 Paris attacks that claimed 130 lives, and in response to FBI warnings about threats by the Islamic State terrorist group, stringent security measures were pre-emptively imposed on St. …”
Get full text
Article -
4169
Survey on trust evaluation mechanism in sensor-cloud
Published 2018-06-01“…Sensor-cloud has gradually developed into a research hotspot.A good trust evaluation mechanism can better address some security issues in this new structure,such as internal attacks.A good trust evaluation mechanism can also ensure the security and efficient transmission of information in this structure.After an extensive research on sensor-cloud and trust evaluation mechanisms,it was found that trust evaluation mechanisms in sensor-cloud can be divided into two categories,among entities and in entity.After comparing the advantages and shortcomings of existing trust evaluation mechanisms,a new fog-based trust evaluation mechanism was designed and future research directions of trust evaluation mechanisms were discussed in sensor-cloud.…”
Get full text
Article -
4170
Multi-factor identity authentication scheme for trusted sharing of cultural resources
Published 2023-10-01“…To solve the problems of data leakage and identity impersonation caused by traditional single factor authentication, a multi-factor identity authentication scheme based on blockchain was proposed for the trusted sharing of cultural resources.Considering a variety of identity factors, a heterogeneous digital identity model was constructed using the tamper resistance and distribution of the blockchain distributed ledger.Through asymmetric encryption algorithm and exclusive OR (XOR) operation, the trusted reuse of heterogeneous digital identity and fast authentication of multi-agent access were realized.Security analysis and simulation results show that the proposed scheme outperforms existing multi-factor authentication schemes in terms of security and efficiency, and can effectively reduce the cost of identity authentication.…”
Get full text
Article -
4171
A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme
Published 2014-01-01“…The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.…”
Get full text
Article -
4172
Exploring the potential of blockchain technology for citizen engagement in smart governance [version 4; peer review: 1 approved, 3 approved with reservations]
Published 2025-01-01“…By examining the benefits of BCT in various aspects of smart city systems, such as data security and privacy, the paper highlights the advantages of implementing consortium blockchain architecture and the Proof of Authority (PoA) consensus algorithm and discusses the challenges of scalability and security concerns. …”
Get full text
Article -
4173
Spousal Individual Retirement Accounts
Published 2014-11-01“… A spouse who stays at home to take care of children or other dependents is likely to have reduced Social Security benefits and will not have access to a workplace retirement plan. …”
Get full text
Article -
4174
Quantum key supply and dynamic adjustment strategies for power dispatch
Published 2018-12-01“…In order to ensure the transmission security of electric power dispatching service data,a quantum key supply and dynamic adjustment algorithm was provided.Firstly,the key application mode was determined according to the priority of different services,and the calculation method of the key pool capacity was also provided.Secondly,the quantum key dynamic adjustment algorithm was designed based on the key update frequency and application mode.Finally,the traffic model for the dispatching system was established,and the algorithm’s application performance for different scenarios was simulated within point-to-point/multipoint architectures.The test results show that the algorithm can realize the dynamic key adjustment in the selected adjustment period,and thus improves the security of the scheduling data transmissions.…”
Get full text
Article -
4175
Survey of federated learning research
Published 2021-10-01“…Federated learning has rapidly become a research hotspot in the field of security machine learning in recent years because it can train the global optimal model collaboratively without the need for multiple data source aggregation.Firstly, the federated learning framework, algorithm principle and classification were summarized.Then, the main threats and challenges it faced, were analysed indepth the comparative analysis of typical research programs in the three directions of communication efficiency, privacy and security, trust and incentive mechanism was focused on, and their advantages and disadvantages were pointed out.Finally, Combined with application of edge computing, blockchain, 5G and other emerging technologies to federated learning, its future development prospects and research hotspots was prospected.…”
Get full text
Article -
4176
Certificateless signature scheme without bilinear pairings
Published 2012-04-01“…To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key cryptography.Almost all existing certificateless signature schemes need bilinear pairings either during signature generation stage or the signature verification stage,and were proven secure only with stronger computational assumptions.A new certificateless signature scheme without pairings was proposed.The scheme is provably secure in the random oracle model(ROM)under the relatively weaker assumption,i.e.…”
Get full text
Article -
4177
Efficient traceable identity-based signature scheme
Published 2009-01-01“…Moreover, a T-IBS scheme without pairing was presented and the security of the provided scheme was provided under the elliptic curve discrete logarithm assumption and the random oracle model. …”
Get full text
Article -
4178
Research on area-efficient low-entropy masking scheme for AES
Published 2019-05-01“…Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling operation and improving the throughput by pipelining operation were the main idea of the proposed scheme.For the AES,the number of S-boxes could be reduced from 16 to 4 (key expansion module wasn’t included).Compared with the RSM,the combinational logic,the dedicated logic and the memory size are reduced to 69%,60% and 80% respectively.In addition,the theoretical analysis shows that the proposed scheme can resist offset based CPA attack,thus has higher security than the RSM.…”
Get full text
Article -
4179
A millennium of cold and humid climate decreased carbon accumulation in the subtropical monsoon peatland
Published 2025-01-01Get full text
Article -
4180
BANDITRY AND GENDER-BASED VOLIENCE IN NORTH-WEST NIGERIA
Published 2023-08-01“… The menace of banditry over the years had had a devastating effects on both developed and developing countries of the world alike. This emerging security challenge has threatened the very fabric of the fragile peace the Nigerian State was enjoying; especially, in the Northwest states of Zamfara, Kaduna, Katsina, etc. …”
Get full text
Article