Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4261
Extended-CSP based analysis of non-repudiation protocols
Published 2008-01-01“…A new formal method named extended-CSP approach was proposed for non-repudiation protocols.For check-ing its validity,both the well-known Zhou-Gollmann fair non-repudiation protocol presented by Zhou et al.in 1996 and one of its variant protocol were analyzed with this method.The result showed that this method not only could be used to analyze some security properties that could not be described by other methods,but also detected a known flaw of the protocol which could not be found by others,and meanwhile proved the variant protocol really enhancing its security.Finally,the correctness of this method was surveyed from the points of both its semantic and theory dependency,and some advantages in comparison with others were also showed together.…”
Get full text
Article -
4262
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Published 2016-01-01“…Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.…”
Get full text
Article -
4263
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01“…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
Get full text
Article -
4264
Analysis and status of the scattering channel model for ultraviolet communications
Published 2021-06-01“…Due to its unique features such as high local security, low background noise, and non-light-of-sight communication, the ultraviolet communication, which uses the light wave of “solar blind” wavelength (200~280 nm) as the information carrier, becomes a promising optical communication technique for applications in both secure communications and internet of vehicles and so on.The scattering channel models were classified into analytical channel models and stochastic channel models according to their different computational efficiencies.The research of the first three scattering orders in analytical channel models and the Monte-Carlo simulation model and Monte-Carlo integration model in stochastic channel models were mainly focused on.Some future research directions for the scattering channel model of ultraviolet communications were also provided.…”
Get full text
Article -
4265
Survey of digital signature technology based on error correcting codes
Published 2016-11-01“…The emergence of quantum algorithms have threatened the security of digital signature algorithms widely used currently,most of which based on some hard problems in number theory.The digital signature algorithms based on error correcting codes,which can resist quantum attack,has been studied by many researchers in recent years and there have been many research results in different areas,such as normal digital signature,blind signature,ring signature,group signature.Because of the fast computation speed and high security,it has become one of the most promising digital signature technologies.A comprehensive introduction was given and digital signature technologies based on error correcting codes were summarized,the key technologies were analyzed and the possible research directions in the future were pointed out.…”
Get full text
Article -
4266
Pratiques harmonisées d’accompagnement des étudiants et impact sur leur sentiment de sécurité
Published 2017-11-01“…Results showed a positive link between the concepts of "harmonized practices" and students’ "feeling of security" that led to students’ motivation for learning. …”
Get full text
Article -
4267
Overview of anomaly detection techniques for industrial Internet of things
Published 2022-03-01“…In view of the differences of existing anomaly detection methods and the applicability when applied to security protection of the industrial Internet of things (IIoT), based on technical principles, the network anomaly detection papers published from 2000 to 2021 were investigated and the security threats faced by IIoT were summarized.Then, network anomaly detection methods were classified into 9 classes and the characteristics of each class was studied.Through longitudinal comparison, the merits and shortcomings of different methods and their applicability to IIoT scenarios were sorted out.In addition, statistical analysis and comparison of common data sets were made, and the development trend in the future was forecasted from 4 directions.The analysis results can guide the selection of adaptive methods according to application scenarios, identify key problems to be solved, and point out the direction for subsequent research.…”
Get full text
Article -
4268
Enhanced Beidou user equipment access authentication protocol based on location key
Published 2022-11-01“…In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication protocol based on location key was proposed, which realized the mutual authentication and session key negotiation between entities.Combining Beidou’s location information and master key to form a two-factor, the proposed protocol solved the security problem of the master key leaking due to the equipment being captured during the authentication process to some extent.The proposed protocol can meet different security requirements through the verification of the Scyther formal tool.Compared with other similar schemes, it has better performance overhead, and is suitable for Beidou satellite navigation system with limited node resources.…”
Get full text
Article -
4269
La durabilité de la chaîne d’approvisionnement en fruits et légumes à l’épreuve du Covid-19 : cas de la ville de Meknès au Maroc
Published 2022-12-01“…On the other hand, the study showed that some areas are still vulnerable, such as the lack of social security coverage for employees and the weak coordination of stakeholders in CAF & L.…”
Get full text
Article -
4270
Resource allocation algorithm for situation awareness based on multiple-choice quadratic knapsack
Published 2016-12-01“…In order to deal with the potential cyber-threat and improve the security situation by using limited resource properly, the optimal allocation of resource focused on cyber security situation. …”
Get full text
Article -
4271
Cloud outsourcing secret sharing scheme against covert adversaries
Published 2017-05-01“…In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.…”
Get full text
Article -
4272
Multi-authority attribute-based encryption access control model for cloud storage
Published 2015-06-01“…The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP-ABE method,a multi-authority attribute-based encryption scheme is designed to improve security level.Minimized attribute grouping algorithm is designed to distribute keys to users according to needs,which can reduce unnecessary attribute key distribution and decrease the amount of re-encryption attributes.The read and write attribute are added to strengthen the control of owners.The analysis shows that the proposed scheme can meet the security requirement of access control in cloud,and it also has less response time and system cost.…”
Get full text
Article -
4273
Efficient certificateless sequential multi-signature scheme
Published 2013-07-01“…It is proven in the random oracle that the security of the scheme is based on the fact that the computational Diffie-Hellman problem is hard. …”
Get full text
Article -
4274
Structure and performance analysis of binary differential stochastic process shift keying
Published 2014-12-01“…A novel modulation and demodulation structure based on binary differential stochastic process shift keying (BDSPSK) is proposed.The theoretical bit error rates (BER) under the Gaussian and quasi-static Rayleigh fading chan-nels are derived,respectively.To verify its performances and security,lots of simulations are done by using MATLAB.The simulations' results show that the BER of the proposed BDSPSK can reach 10<sup>−4</sup>when signal to noise ratio (SNR) is about −2 dB in the Gaussian channel or 25 dB in the Rayleigh fading channel.Meanwhile,the proposed method has a good concealment due to its undetectable property by the generalized second order cyclostationary spectrum,which makes it suit for secure communications in the physical layer.…”
Get full text
Article -
4275
Openstack authentication protocol based on digital certificate
Published 2019-02-01“…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
Get full text
Article -
4276
To use and engage? Identifying distinct user types in interaction with a smartphone-based intervention
Published 2025-03-01Get full text
Article -
4277
-
4278
-
4279
Impact of the National Drug Price Negotiation policy on the price, usage, and affordability of anticancer medicines in Shandong Province, China
Published 2025-01-01“…It is essential to encourage the research and development of high-quality generic drugs to strengthen reasonable market competition, as well as improve the multi-tiered medical security system.…”
Get full text
Article -
4280