Showing 4,161 - 4,180 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4161

    Self-healing key distribution scheme of MANET based on sliding window by DU Chun-lai, HU Ming-zeng, ZHANG Hong-li, ZHANG Wei-zhe

    Published 2009-01-01
    “…A new self-healing key distribution scheme of MANET based on sliding window was proposed in order to re-duce the burden of manager supervising self-healing MANET and to deal with the scene of some users’ lifetime bestrid-ing two session windows.A dual hash directional key chain model was set up.The model achieves t-revocation capability by using control parameter.Through the security analysis,the model has settled users’ bestriding problem yet still achieved security property.Because manager once distributes initial private information to bestriding user and so avoids distributing it again in rebuilding phase,the model reduces the communication cost.…”
    Get full text
    Article
  2. 4162

    Current Status of Forensic Virtual Autopsy Laboratory Construction in China by Yunle Meng, Tu Lyu, Chaopeng Yang, Guanglong He

    Published 2024-12-01
    “…Several provinces have established virtual autopsy laboratories within their public security system. However, these initiatives face challenges including equipment costs, the needs for technological updates, professional training, and the establishment of regulatory standards. …”
    Get full text
    Article
  3. 4163

    Mimic storage scheme based on regenerated code by Yue CHEN, Longjiang WANG, Xincheng YAN, Xinyue ZHANG

    Published 2018-04-01
    “…Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors,which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random,time-varying and dynamic scheme,which increases the uncertainty of storage system.It blocks and interferes with the attack chain,increases the difficulty and cost of the attack operation,and improves the security and reliability of the system.…”
    Get full text
    Article
  4. 4164

    Tracing the Blockchain Challenges in Healthcare: A Topic Modeling and Bibliometric Analysis by Mohammad Mehraeen, Laya Mahmoudi

    Published 2024-12-01
    “…The application of blockchain technology to healthcare offers promise in providing solutions to some key challenges related to data sharing, privacy, security, and access control. There are however several barriers preventing blockchain adoption from spreading widely, which has prompted research efforts. …”
    Get full text
    Article
  5. 4165

    Privacy protection of warning message publishing protocol in VANET by Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG

    Published 2021-08-01
    “…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
    Get full text
    Article
  6. 4166

    Novel chaotic block encryption scheme for WSN based on dynamic sub key by Ya-hua WANG, Yu-hua LING, Li-qing LIAO, Ke-hui SUN, Wen-hao LIU

    Published 2017-12-01
    “…In view of high efficiency and security requirements in WSN encryption algorithm,a lightweight chaotic block encryption algorithm was designed and a novel scheme of dynamic sub keys extension was proposed.To greatly reduce the computing burden of WSN nodes,this scheme made full use of WSN cloud servers monitoring platform,which was powerful in data computing and processing,and transfered the sub keys synchronization task from nodes to cloud servers.Experimental results and performance analysis show that the scheme has good characteristics of diffusion,confusion and statistical balance,strong key security and high algorithm efficiency.It has a good application prospect in the field of WSN communication encryption.…”
    Get full text
    Article
  7. 4167

    Research of discovering vulnerabilities of NFC applications on Android platform by Zhi-qiang WANG, Qi-xu LIU, Yu-qing ZHANG

    Published 2014-11-01
    “…To improve the security of NFC technology,a research is done for discovering NDEF vulnerabilities of NFC applications on Android platform,and a method of bug hunting is proposed on based Fuzzing technology.The method adopts manual craft,the generation and the mutation strategies to construct test cases,and uses two assistant means of analyzing and constructing test cases,including reverse message anylysis and packet sniffing.Then,NFC applications’ vulnerabilities with constructed test cases and output results are discovered.According to the method,a system called ANDEFVulFinder is developed for discovering the security vulnerabilities of NFC applications.The tool logcat and process monitoring are used to monitor targets’ exceptions during the discovering process,and the test is automated…”
    Get full text
    Article
  8. 4168

    Urban Terrorism: St. Peter’s Square, Vatican City by Daniel Tan

    Published 2017-02-01
    “…In the wake of the 2015 Paris attacks that claimed 130 lives, and in response to FBI warnings about threats by the Islamic State terrorist group, stringent security measures were pre-emptively imposed on St. …”
    Get full text
    Article
  9. 4169

    Survey on trust evaluation mechanism in sensor-cloud by Tian WANG, Guangxue ZHANG, Shaobin CAI, Weijia JIA, Guojun WANG

    Published 2018-06-01
    “…Sensor-cloud has gradually developed into a research hotspot.A good trust evaluation mechanism can better address some security issues in this new structure,such as internal attacks.A good trust evaluation mechanism can also ensure the security and efficient transmission of information in this structure.After an extensive research on sensor-cloud and trust evaluation mechanisms,it was found that trust evaluation mechanisms in sensor-cloud can be divided into two categories,among entities and in entity.After comparing the advantages and shortcomings of existing trust evaluation mechanisms,a new fog-based trust evaluation mechanism was designed and future research directions of trust evaluation mechanisms were discussed in sensor-cloud.…”
    Get full text
    Article
  10. 4170

    Multi-factor identity authentication scheme for trusted sharing of cultural resources by Miaomiao WANG, Lanlan RUI, Siya XU

    Published 2023-10-01
    “…To solve the problems of data leakage and identity impersonation caused by traditional single factor authentication, a multi-factor identity authentication scheme based on blockchain was proposed for the trusted sharing of cultural resources.Considering a variety of identity factors, a heterogeneous digital identity model was constructed using the tamper resistance and distribution of the blockchain distributed ledger.Through asymmetric encryption algorithm and exclusive OR (XOR) operation, the trusted reuse of heterogeneous digital identity and fast authentication of multi-agent access were realized.Security analysis and simulation results show that the proposed scheme outperforms existing multi-factor authentication schemes in terms of security and efficiency, and can effectively reduce the cost of identity authentication.…”
    Get full text
    Article
  11. 4171

    A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme by Xianhan Zhang, Yang Cao

    Published 2014-01-01
    “…The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.…”
    Get full text
    Article
  12. 4172

    Exploring the potential of blockchain technology for citizen engagement in smart governance [version 4; peer review: 1 approved, 3 approved with reservations] by Rebecca Marconi, Edna Pasher, Niccolò Testi

    Published 2025-01-01
    “…By examining the benefits of BCT in various aspects of smart city systems, such as data security and privacy, the paper highlights the advantages of implementing consortium blockchain architecture and the Proof of Authority (PoA) consensus algorithm and discusses the challenges of scalability and security concerns. …”
    Get full text
    Article
  13. 4173

    Spousal Individual Retirement Accounts by Lisa Leslie

    Published 2014-11-01
    “… A spouse who stays at home to take care of children or other dependents is likely to have reduced Social Security benefits and will not have access to a workplace retirement plan. …”
    Get full text
    Article
  14. 4174

    Quantum key supply and dynamic adjustment strategies for power dispatch by Wei DENG, Zhuozhi YU, Yefeng ZHANG, Yalin CHEN, Yonghong MA

    Published 2018-12-01
    “…In order to ensure the transmission security of electric power dispatching service data,a quantum key supply and dynamic adjustment algorithm was provided.Firstly,the key application mode was determined according to the priority of different services,and the calculation method of the key pool capacity was also provided.Secondly,the quantum key dynamic adjustment algorithm was designed based on the key update frequency and application mode.Finally,the traffic model for the dispatching system was established,and the algorithm’s application performance for different scenarios was simulated within point-to-point/multipoint architectures.The test results show that the algorithm can realize the dynamic key adjustment in the selected adjustment period,and thus improves the security of the scheduling data transmissions.…”
    Get full text
    Article
  15. 4175

    Survey of federated learning research by Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE

    Published 2021-10-01
    “…Federated learning has rapidly become a research hotspot in the field of security machine learning in recent years because it can train the global optimal model collaboratively without the need for multiple data source aggregation.Firstly, the federated learning framework, algorithm principle and classification were summarized.Then, the main threats and challenges it faced, were analysed indepth the comparative analysis of typical research programs in the three directions of communication efficiency, privacy and security, trust and incentive mechanism was focused on, and their advantages and disadvantages were pointed out.Finally, Combined with application of edge computing, blockchain, 5G and other emerging technologies to federated learning, its future development prospects and research hotspots was prospected.…”
    Get full text
    Article
  16. 4176

    Certificateless signature scheme without bilinear pairings by Sheng-bao WANG, Wen-hao LIU, Qi XIE

    Published 2012-04-01
    “…To solve the key escrow problem inherited in ID-based cryptography and the complex certificate management problem of traditional certification-based public key cryptosystem,Al-Riyami and Paterson proposed the novel concept of certificateless public key cryptography.Almost all existing certificateless signature schemes need bilinear pairings either during signature generation stage or the signature verification stage,and were proven secure only with stronger computational assumptions.A new certificateless signature scheme without pairings was proposed.The scheme is provably secure in the random oracle model(ROM)under the relatively weaker assumption,i.e.…”
    Get full text
    Article
  17. 4177

    Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2

    Published 2009-01-01
    “…Moreover, a T-IBS scheme without pairing was presented and the security of the provided scheme was provided under the elliptic curve discrete logarithm assumption and the random oracle model. …”
    Get full text
    Article
  18. 4178

    Research on area-efficient low-entropy masking scheme for AES by Jiuxing JIANG, Jiao HOU, Hai HUANG, Yuying ZHAO, Xinxin FENG

    Published 2019-05-01
    “…Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling operation and improving the throughput by pipelining operation were the main idea of the proposed scheme.For the AES,the number of S-boxes could be reduced from 16 to 4 (key expansion module wasn’t included).Compared with the RSM,the combinational logic,the dedicated logic and the memory size are reduced to 69%,60% and 80% respectively.In addition,the theoretical analysis shows that the proposed scheme can resist offset based CPA attack,thus has higher security than the RSM.…”
    Get full text
    Article
  19. 4179
  20. 4180

    BANDITRY AND GENDER-BASED VOLIENCE IN NORTH-WEST NIGERIA by Simon Nankap KUMS, Cornelius Ishaya KWEDE

    Published 2023-08-01
    “… The menace of banditry over the years had had a devastating effects on both developed and developing countries of the world alike. This emerging security challenge has threatened the very fabric of the fragile peace the Nigerian State was enjoying; especially, in the Northwest states of Zamfara, Kaduna, Katsina, etc. …”
    Get full text
    Article