Showing 4,221 - 4,240 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4221

    Two-layer threat analysis model integrating macro and micro by Cheng SUN, Hao HU, Yingjie YANG, Hongqi ZHANG

    Published 2021-02-01
    “…The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM was established.The upper layer of the model depicted the threat development trend.The lower layer depicted the threat propagation path considering social engineering and networks can.Based on the model, prediction algorithm of threat development was proposed.The experimental result shows that the model can comprehensively analyze the threat propagation at multiple levels, overcome the defect that the threat analysis model based on attack graph is limited to technical vulnerability attack, and is more suitable for dynamic tracking analysis of advanced security threats.…”
    Get full text
    Article
  2. 4222

    Block cipher mode research based on identifier of text files by Tong-ming ZHANG, Jian-feng GUAN

    Published 2017-03-01
    “…The electronic code book(ECB)mode cannot conceal the data model of the plaintext and has only one private key to the whole plaintext.A block cipher mode based on identity for text files was proposed,which ab-sorbed the advantages of block cipher mode and the feature of plaintext string.A double Hash mapping structure was designed and one layer of the mapping structure maps the plaintext into discontinuous groups,another one which was based on the concept of identify library produced corresponding private key to the plaintext group.The model overcame the discontinuous group and single private key problem and effectively improved the security of the cipher text.The experiment results show that the new model has better security,flexibility and extensibility.…”
    Get full text
    Article
  3. 4223

    Self-healing group key distribution scheme with revocation based on dual directional hash chain by DU Chun-lai1, HU Ming-zeng2, ZHANG Hong-li2, ZHANG Dong-yan2

    Published 2009-01-01
    “…A self-healing group key distribution scheme with revocation in MANET using dual directional hash chain was proposed.The association relation between different session keys was built.By means of broadcast information and own secrets,the legal nodes which lost some legal session keys due to network faults could be capable of recovering such lost session keys on their own,without requiring additional transmission from the group manager.The group manager could revoke the group nodes by revocation polynomial.Node was endowed with a set of masking secret according to its life-cycle.Through the security and efficiency analysis,the key distribution scheme reduces communication cost and storage cost yet still achieves security property.…”
    Get full text
    Article
  4. 4224

    Attribute-based fully homomorphic encryption scheme over rings by Yong-hui ZHENG, Yuan-ji KANG, Chun-xiang GU, Hui DONG

    Published 2017-04-01
    “…The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted its practical.To improve these drawbacks,a recoding scheme and a attribute-based encryption scheme based on learning with errors problem over rings were provided,then a attribute-based fully homomorphic encryption was constructed.The new scheme overcame the above mentioned drawbacks,because it did't need public key certificate,meanwhile,it can achieve the fine-grained access control to the ciphertext.Compared with similar results,proposed method decreases the size of keys and ciphertext greatly.…”
    Get full text
    Article
  5. 4225

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  6. 4226

    Research of a trusted execution environment module for multiple platforms by Qian-ying ZHANG, Shi-jun ZHAO, Wei FENG, Yu QIN, Deng-guo FENG

    Published 2014-11-01
    “…The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM TrustZone technology to build a trusted computing module running in a secure isolated environment is designed.Proposed module not only supports variety of platforms,but also has strong mobility and portability.Moreover,it allows configuring and updating functions and algorithms of the module flexibly.A prototype system is implemented and its performance is tested.By analyzing the security of the system and the measurement results,it is shown that TEEM provides users with a safe,stable,efficient trusted execution environment.…”
    Get full text
    Article
  7. 4227

    Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning by Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Perez-Meana, Jose Portillo-Portillo, Jesus Olivares-Mercado, Luis Javier García Villalba

    Published 2025-01-01
    “…By employing Few-Shot Learning (FSL), Proto-MAML identifies and mitigates vulnerabilities with minimal data requirements, aligning with the principles of the Secure Development Lifecycle (SDLC) and Development, Security, and Operations (DevSecOps). …”
    Get full text
    Article
  8. 4228
  9. 4229

    SPATA: Strong Pseudonym-Based AuthenTicAtion in Intelligent Transport System by Qazi Ejaz Ali, Naveed Ahmad, Abdul Haseeb Malik, Gauhar Ali, Muhammad Asif, Muhammad Khalid, Yue Cao

    Published 2018-01-01
    “…Intelligent transport system (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of pseudonyms to revoke malicious vehicles. …”
    Get full text
    Article
  10. 4230

    Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim

    Published 2020-01-01
    “…The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP. …”
    Get full text
    Article
  11. 4231

    Time-bin entangled Bell state generation and tomography on thin-film lithium niobate by Giovanni Finco, Filippo Miserocchi, Andreas Maeder, Jost Kellner, Alessandra Sabatti, Robert J. Chapman, Rachel Grange

    Published 2024-12-01
    “…Abstract Optical quantum communication technologies are making the prospect of unconditionally secure and efficient information transfer a reality. …”
    Get full text
    Article
  12. 4232

    Qualified Digital Ecosystems As an Academic Information System Framework in The Industrial 4.0 by Ino Sulistiani, Nursaeni, Bobur Sobirov

    Published 2024-12-01
    “…The research also utilizes ISO 9126 and ISO/IEC 25010 quality models to establish usability and security standards, while the Academic Information System Quality Instrument (AISQI) is introduced to evaluate system performance. …”
    Get full text
    Article
  13. 4233

    Investigation the Citizen\'s Satisfaction from the elements of sense of belonging (Case study: Golha Residential Complex of Rasht) by Matin Farzidi, Reza Parvizi, Maryam Daneshshakib, SeyedReza Azadeh

    Published 2022-09-01
    “…Nowadays, the lack of attachment is a significant point in the construction of towns, which is demonstrated with criteria such as lack of environmental attraction and visual qualities, lack of readability, security, and so on. These factors will affect people's relationship with the environment around them and thus their satisfaction. …”
    Get full text
    Article
  14. 4234

    A chaotic digital signature algorithm based on a dynamic substitution box by Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, Miguel Gabriel Villarreal-Cervantes

    Published 2025-01-01
    “…In addition, to enhance security, this work uses a 2048-bit prime, double the length frequently used. …”
    Get full text
    Article
  15. 4235

    Surgical Synechiolysis of Iridocapsular Adhesion and Sulcus Placement of a Rigid Intraocular Lens on an Oversized Residual Capsular Rim by Jiao Lyu, Qi Zhang, Haiying Jin, Tingyi Liang, Jili Chen, Peiquan Zhao

    Published 2018-01-01
    “…A preserved capsulorhexis after sufficient synechiolysis, which can secure the IOL optic intraoperatively, may yield better stability of the IOL position.…”
    Get full text
    Article
  16. 4236

    Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions by Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, Shafiullah Khan, Noha Alnazzawi

    Published 2025-01-01
    “…The review emphasizes the integration of advanced security technologies, including machine learning (ML), federated learning (FL), blockchain, blockchain–ML, deep learning (DL), encryption, cryptography, IT/OT convergence, and digital twins, as essential for enhancing the security and real-time data protection of CPS in IIoT–edge computing. …”
    Get full text
    Article
  17. 4237

    A high speed processor for elliptic curve cryptography over NIST prime field by Xianghong Hu, Xueming Li, Xin Zheng, Yuan Liu, Xiaoming Xiong

    Published 2022-07-01
    “…Abstract Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. It is challenging to implement a scalar multiplication (SM) operation which has the highest computational complexity in ECC. …”
    Get full text
    Article
  18. 4238

    Food Insecurity and Not Dietary Diversity Is a Predictor of Nutrition Status in Children within Semiarid Agro-Ecological Zones in Eastern Kenya by Zipporah N. Bukania, Moses Mwangi, Robert M. Karanja, Richard Mutisya, Yeri Kombe, Lydia U. Kaduka, Timothy Johns

    Published 2014-01-01
    “…No significant difference (P>0.05) was observed in food security and dietary diversity score (DDS) between LM4 and LM5. …”
    Get full text
    Article
  19. 4239

    Cloud Platform Selection Model in the Framework of Differential Quality Game With Fuzzy Information by Kaiyrbek Makulov, Arkadii A. Chikrii, Valery Lakhno, Bagdat Yagaliyeva, Volodimir Malyukov, Inna Malyukova, Miroslav Lakhno

    Published 2025-01-01
    “…Employing a differential quality game with fuzzy information, this study introduces a reliable DSS that incorporates cost, security and QoS to select the most appropriate cloud platform. …”
    Get full text
    Article
  20. 4240