Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4221
Two-layer threat analysis model integrating macro and micro
Published 2021-02-01“…The existing threat analysis models failed to comprehensively analyze the propagation of advanced security threats integrating the threat development trend and propagation path.In order to solve the problem, a two-layer threat analysis model named TL-TAM was established.The upper layer of the model depicted the threat development trend.The lower layer depicted the threat propagation path considering social engineering and networks can.Based on the model, prediction algorithm of threat development was proposed.The experimental result shows that the model can comprehensively analyze the threat propagation at multiple levels, overcome the defect that the threat analysis model based on attack graph is limited to technical vulnerability attack, and is more suitable for dynamic tracking analysis of advanced security threats.…”
Get full text
Article -
4222
Block cipher mode research based on identifier of text files
Published 2017-03-01“…The electronic code book(ECB)mode cannot conceal the data model of the plaintext and has only one private key to the whole plaintext.A block cipher mode based on identity for text files was proposed,which ab-sorbed the advantages of block cipher mode and the feature of plaintext string.A double Hash mapping structure was designed and one layer of the mapping structure maps the plaintext into discontinuous groups,another one which was based on the concept of identify library produced corresponding private key to the plaintext group.The model overcame the discontinuous group and single private key problem and effectively improved the security of the cipher text.The experiment results show that the new model has better security,flexibility and extensibility.…”
Get full text
Article -
4223
Self-healing group key distribution scheme with revocation based on dual directional hash chain
Published 2009-01-01“…A self-healing group key distribution scheme with revocation in MANET using dual directional hash chain was proposed.The association relation between different session keys was built.By means of broadcast information and own secrets,the legal nodes which lost some legal session keys due to network faults could be capable of recovering such lost session keys on their own,without requiring additional transmission from the group manager.The group manager could revoke the group nodes by revocation polynomial.Node was endowed with a set of masking secret according to its life-cycle.Through the security and efficiency analysis,the key distribution scheme reduces communication cost and storage cost yet still achieves security property.…”
Get full text
Article -
4224
Attribute-based fully homomorphic encryption scheme over rings
Published 2017-04-01“…The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restricted its practical.To improve these drawbacks,a recoding scheme and a attribute-based encryption scheme based on learning with errors problem over rings were provided,then a attribute-based fully homomorphic encryption was constructed.The new scheme overcame the above mentioned drawbacks,because it did't need public key certificate,meanwhile,it can achieve the fine-grained access control to the ciphertext.Compared with similar results,proposed method decreases the size of keys and ciphertext greatly.…”
Get full text
Article -
4225
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
4226
Research of a trusted execution environment module for multiple platforms
Published 2014-11-01“…The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM TrustZone technology to build a trusted computing module running in a secure isolated environment is designed.Proposed module not only supports variety of platforms,but also has strong mobility and portability.Moreover,it allows configuring and updating functions and algorithms of the module flexibly.A prototype system is implemented and its performance is tested.By analyzing the security of the system and the measurement results,it is shown that TEEM provides users with a safe,stable,efficient trusted execution environment.…”
Get full text
Article -
4227
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Published 2025-01-01“…By employing Few-Shot Learning (FSL), Proto-MAML identifies and mitigates vulnerabilities with minimal data requirements, aligning with the principles of the Secure Development Lifecycle (SDLC) and Development, Security, and Operations (DevSecOps). …”
Get full text
Article -
4228
-
4229
SPATA: Strong Pseudonym-Based AuthenTicAtion in Intelligent Transport System
Published 2018-01-01“…Intelligent transport system (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of pseudonyms to revoke malicious vehicles. …”
Get full text
Article -
4230
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
Published 2020-01-01“…The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP. …”
Get full text
Article -
4231
Time-bin entangled Bell state generation and tomography on thin-film lithium niobate
Published 2024-12-01“…Abstract Optical quantum communication technologies are making the prospect of unconditionally secure and efficient information transfer a reality. …”
Get full text
Article -
4232
Qualified Digital Ecosystems As an Academic Information System Framework in The Industrial 4.0
Published 2024-12-01“…The research also utilizes ISO 9126 and ISO/IEC 25010 quality models to establish usability and security standards, while the Academic Information System Quality Instrument (AISQI) is introduced to evaluate system performance. …”
Get full text
Article -
4233
Investigation the Citizen\'s Satisfaction from the elements of sense of belonging (Case study: Golha Residential Complex of Rasht)
Published 2022-09-01“…Nowadays, the lack of attachment is a significant point in the construction of towns, which is demonstrated with criteria such as lack of environmental attraction and visual qualities, lack of readability, security, and so on. These factors will affect people's relationship with the environment around them and thus their satisfaction. …”
Get full text
Article -
4234
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01“…In addition, to enhance security, this work uses a 2048-bit prime, double the length frequently used. …”
Get full text
Article -
4235
Surgical Synechiolysis of Iridocapsular Adhesion and Sulcus Placement of a Rigid Intraocular Lens on an Oversized Residual Capsular Rim
Published 2018-01-01“…A preserved capsulorhexis after sufficient synechiolysis, which can secure the IOL optic intraoperatively, may yield better stability of the IOL position.…”
Get full text
Article -
4236
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Published 2025-01-01“…The review emphasizes the integration of advanced security technologies, including machine learning (ML), federated learning (FL), blockchain, blockchain–ML, deep learning (DL), encryption, cryptography, IT/OT convergence, and digital twins, as essential for enhancing the security and real-time data protection of CPS in IIoT–edge computing. …”
Get full text
Article -
4237
A high speed processor for elliptic curve cryptography over NIST prime field
Published 2022-07-01“…Abstract Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. It is challenging to implement a scalar multiplication (SM) operation which has the highest computational complexity in ECC. …”
Get full text
Article -
4238
Food Insecurity and Not Dietary Diversity Is a Predictor of Nutrition Status in Children within Semiarid Agro-Ecological Zones in Eastern Kenya
Published 2014-01-01“…No significant difference (P>0.05) was observed in food security and dietary diversity score (DDS) between LM4 and LM5. …”
Get full text
Article -
4239
Cloud Platform Selection Model in the Framework of Differential Quality Game With Fuzzy Information
Published 2025-01-01“…Employing a differential quality game with fuzzy information, this study introduces a reliable DSS that incorporates cost, security and QoS to select the most appropriate cloud platform. …”
Get full text
Article -
4240