Showing 4,241 - 4,260 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 4241
  2. 4242

    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection by Rafał Kozik, Marek Pawlicki, Michał Choraś, Witold Pedrycz

    Published 2019-01-01
    “…Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. …”
    Get full text
    Article
  3. 4243

    Proactive migration model of SWIM service based on situation awareness by Zhijun WU, Shengyan ZHOU, Jin LEI

    Published 2019-08-01
    “…To solve the problem that in the system wide information management (SWIM) network,the SWIM service provider suffers from SWIM service interruption,service delay increase or service quality degradation due to malicious attack or self-failure.Therefore,a proactive migration model of SWIM service was proposed on the basis of situation awareness,which used the random forest algorithm to timely judge the SWIM service provider security situation.SWIM service authority was actively migrated according to security situation,and the emergencies impact on SWIM services were reduces.Experimental results show that the proposed model can guarantee services continuity in an emergency event,which has higher reliability and stability than SWIM network in which the service migration model is not deployed.…”
    Get full text
    Article
  4. 4244

    Integral fault analysis of the ARIA cipher by Yu SHEN, Wei LI, Dawu GU, Yixin WU, Shan CAO, Ya LIU, Zhiqiang LIU, Zhihong ZHOU

    Published 2019-02-01
    “…ARIA is a Korean standard block cipher,which is flexible to provide security for software and hardware implementation.Since its introduction,some research of fault analysis is devoted to attacking the last two rounds of ARIA.It is an open problem to know whether provoking faults at some former rounds of ARIA allowed recovering the secret key.An answer was given to solve this problem by showing a novel integral differential fault analysis on two rounds earlier of ARIA.The mathematical analysis and simulating experiments show that the attack can successfully recover its secret key by fault injections.The results in this study describe that the integral fault analysis is a strong threaten to the security of ARIA.The results are beneficial to the analysis of the same type of other block ciphers.…”
    Get full text
    Article
  5. 4245

    Network authentication technology based on public key system by Songtao PANG

    Published 2016-02-01
    “…Network authentication technology is the key to the application of internet plus security. The digital signature which depends on the certificate authority (CA)and PKI based on public key system is the main method for identity and message authentication. …”
    Get full text
    Article
  6. 4246

    Design of self-adaptive spatio-temporal diversity joint scheduling strategy by Qing TONG, Yunfei GUO, Shumin HUO, Yawen WANG, Yujia MAN, Kai ZHANG

    Published 2021-07-01
    “…To solve the problem that a diversity system is difficult to take defense capability, defense cost and quality of service into account at the same time under a single diversity strategy, firstly, the scheduling object selecting sequences under different security levels were constructed based on the measurement of scheduling heterogeneity, executor security and spatial diversity.Then, according to the coarse-grained evaluation of threat environment, the scheduling time and scheduling object were determined comprehensively.Through the realization of the spatio-temporal diversity Web server system in a cloud environment, the proposed scheduling strategy was tested with attack and defense experiments and compared with the existing scheduling strategies.The results show that the proposed scheduling strategy improves the defense capability significantly and maintains a high quality of service within the acceptable defense cost increasing range.…”
    Get full text
    Article
  7. 4247

    Research on batch anonymous authentication scheme for VANET based on bilinear pairing by Cheng SONG, Ming-yue ZHANG, Wei-ping PENG, Zong-pu JIA, Zhi-zhong LIU, Xi-xi YAN

    Published 2017-06-01
    “…To solve the problem of efficiency of anonymous authentication in vehicular ad hoc network,a batch anonymous authentication scheme was proposed by using bilinear pairing on elliptic curves .The signature was generated by the roadside unit node (RSU) and the vehicle together.Thus,the burden of VANET certification center was reduced and the authentication efficiency was proved.Meanwhile,the difficulty of the attacker to extract the key was increased.Furthermore,security proofs were given to the scheme in the random oracle model.Analysis shows that the proposed scheme can meet the needs of many kinds of security requirements,the computational overhead is significantly reduced,and the authentication efficiency is improved effectively too.Therefore,the scheme has important theoretical significance and application value under computational capability constrained Internet of things (IoT) environment.…”
    Get full text
    Article
  8. 4248

    Diversity of controllable anonymous communication system by Yan-wei ZHOU, Zhen-qiang WU, Bo YANG

    Published 2015-06-01
    “…With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.…”
    Get full text
    Article
  9. 4249

    ICO AND STO AS MODERN TOOLS FOR CROWDFUNDING STARTUPS by A. V. Kozhanova

    Published 2020-04-01
    “…The low survival rate of ICO-projects led to the development of STO (security token offering) market, which guarantees the investor’s secured rights. …”
    Get full text
    Article
  10. 4250

    MODERN APPROACHES TO THE ORGANIZATION OF FINANCIAL SUPPLY OF THE ARMED FORCES OF THE KYRGYZ REPUBLIC by R. Sh. Bekishov

    Published 2021-02-01
    “…The paper considers military reform as a necessary component of political and socio-economic reforms, one of the determining conditions for their success, an effective factor in ensuring the defense and security of Kyrgyzstan, its active and constructive role in the modern world. …”
    Get full text
    Article
  11. 4251

    Novel key management and authentication scheme for ad hoc space networks by YANG De-ming, MU De-jun, XU Zhong

    Published 2006-01-01
    “…To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self-organizational network,which posed unique challenges to security for the network.A novel and flexible security architecture was proposed,which aimed to provide public key infrastructure and authentication scheme.Based on the absolute distributed certificate authority almost any standard public-key-based authentication protocol could be adopted directly.In cases where the space nodes involved were extremely limited in computational resources,a light-weight authentication scheme that provided integrity and confidentiality based on cryptographic hash functions and symmetric key cryptography was proposed.…”
    Get full text
    Article
  12. 4252

    Implementation of shared file encrypted storage hierarchical access control scheme by Li LI, Guo-zhen SHI, Xuan WANG, Yun-fei CI

    Published 2016-07-01
    “…The traditional file sharing way is single,lack of security,and the shared file's permission autonomous control is too high.To solve these problems,a file encrypted storage and hierarchical access control scheme was proposed.Through increasing classification management unit in the system,classification of users and documents,users of file access control were achieved,the scope of file access control was realized.Security of file storage and transmission was realized through encryption,the key storage was simplified using hierarchical key.Server file en-cryption and decryption operations were achieved through a special password card,which reduced the server work-load and accelerated the file encryption and decryption processing.The scheme was verified on PC and Zynq plat-form,and the predetermined function was realized.…”
    Get full text
    Article
  13. 4253

    Privacy-perserving scheme for social networks by Zhi-quan LV, Cheng HONG, Min1 ZHANG, Deng-guo FENG, Kai-qu CHEN

    Published 2014-08-01
    “…The security and privacy issues in SNS were studied and a privacy-preserving scheme PPSNS was proposed. …”
    Get full text
    Article
  14. 4254

    Distributed Energy Management for Port Power System under False Data Injection Attacks by Qihe Shan, Xin Zhang, Qiongyue Zhang, Qiuye Sun

    Published 2022-01-01
    “…Firstly, a hierarchical topology is proposed to allocate the security resources of the port power system. Secondly, by reconstructing the topological structure of the port information system, the robustness of the information system is improved, and the impact of false data injection attacks on the port power system is reduced, which realizes secure distributed energy management of the port power system. …”
    Get full text
    Article
  15. 4255

    Improvement of lightweight threshold group signature scheme by Zhirong ZHU, Jiayu LYU, Guohua YE, Zhiqiang YAO

    Published 2020-08-01
    “…In order to improve the security and efficiency of threshold group signature in 5G environment,a new scheme was proposed.The core idea was to introduce message token and dynamic identity to improve the freshness of authentication information and increase the difficulty of enemy attacks.At the same time,the number of interactions between the participating parties was simplified,and some computing tasks were migrated to the server to reduce the computing overhead of the member part.After security analysis,the proposed scheme can resist multiple attacks including replay attack.After performance analysis,the proposed scheme can reduce the interaction with the trusted center twice compared with similar schemes,reduce the signature space by 30%,and have shorter execution time,which is suitable for resource-constrained devices under 5G network.…”
    Get full text
    Article
  16. 4256

    Novel self-renewal hash chain scheme based on (t,n) threshold and division tree by Hai-ping HUANG, Ting DAI, Ru-chuan WANG, Xiao-lin QIN, Jiu-tian CHEN

    Published 2013-04-01
    “…The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains,but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity.The definitions of repetition,division and division-tree was proposed,and then a novel self-renewable hash chain construction scheme was put forward based on division and (,t n)-Mignotte's threshold Chinese remainder theorem secret sharing scheme.From three aspects of key space,twice authent ion and provable security,it theoretically proves that the proposed hash scheme could ensure the novel seed value regenerated safely and resisting the middle-man attack effectively.Simulation experiments demonstrate that the novel scheme obtains equal or more satisfactory performances on the costs of communication,computation and storage than typical schemes.…”
    Get full text
    Article
  17. 4257

    A Review of DNA Cryptography by Ling Chu, Yanqing Su, Xiangyu Yao, Peng Xu, Wenbin Liu

    Published 2025-01-01
    “…After summarizing and discussing the security foundations of these cryptographic methods, we highlight the main challenges relating to measurability, standard protocols, robustness, and operability. …”
    Get full text
    Article
  18. 4258

    Survey on cyber deception by Zhao-peng JIA, Bin-xing FANG, Chao-ge LIU, Qi-xu LIU, Jian-bao LIN

    Published 2017-12-01
    “…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
    Get full text
    Article
  19. 4259

    Multi-owner accredited keyword search over encrypted data by Qi-ying WU, Jian-feng MA, Yin-bin MIAO, Jun-wei ZHANG, Li-min SHEN

    Published 2017-11-01
    “…A sharing multi-owner setting where data was owned by a fixed number of data owners,the existing searchable encryption schemes could not support ciphertext retrieval and fine-grained access control at the same time.For this end,an efficient cryptographic primitive called as multi-owner accredited keyword search over encrypted data scheme was designed,through combining linear secret-sharing technique with searchable encryption schemes,only the data users authorized bymulti-owner by could decrypt the returned results.The formal security analysis shows that the scheme can protect security and privacy under the bilinear Diffie-Hellman assumption.As a further contribution,an empirical study over real-world dataset was conelucted to show the effectiveness and practicability of the scheme.…”
    Get full text
    Article
  20. 4260

    Implications for household health expenditure in China’s ageing population: based on Red Herring hypothesis by Xuyang Du, Hualin Wei, Xianbo Zhang

    Published 2024-10-01
    “…By applying the Heckman select model and a two-part model, the research innovatively includes time to death, income, social security and health level in the benchmark regression in order to validate the recent some new Red Herring hypothesis. …”
    Get full text
    Article