Showing 4,281 - 4,300 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 4281
  2. 4282

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. …”
    Get full text
    Article
  3. 4283
  4. 4284
  5. 4285

    An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things by Sabeen Tahir, Sheikh Tahir Bakhsh, Rayan A Alsemmeari

    Published 2019-11-01
    “…Therefore, the IoT network should be secured against intrusions and disruptions; the data exchanged throughout the network should be an encrypted form. …”
    Get full text
    Article
  6. 4286

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  7. 4287
  8. 4288
  9. 4289
  10. 4290

    Blockchain-Based Electronic Health Record: Systematic Literature Review by Nehal Ettaloui, Sara Arezki, Taoufiq Gadi

    Published 2024-01-01
    “…The integration of blockchain technology into EHR systems offers substantial improvements in security, privacy, and transparency, thus enhancing overall management efficiency. …”
    Get full text
    Article
  11. 4291

    Opportunities and barriers for reimbursement of digital therapeutics in Austria: Findings From expert interviews by Mahdi Sareban, Gunnar Treff, Jan David Smeddinck, Rada Hussein, Josef Niebauer

    Published 2025-01-01
    “…Methods Based on a stakeholder analysis, seven semi-structured interviews with Austrian experts from the digital health-related fields medicine, public health, health technology assessment, health industry and social security providers were conducted. Interviews were analyzed according to seven predefined themes. …”
    Get full text
    Article
  12. 4292

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  13. 4293
  14. 4294

    Urban Sustainability Based on Citizens’ Participation (Case Study - the City of Sabzevar) by Hadi Hosseini, Husayn Ghodrati, Mohammad Mireh, Yaghoub Zangeneh

    Published 2013-05-01
    “…Reliability coefficient for all items was 0.89 and for all dimensions was more than 0.72 except for the sense of social security dimension. Variables in this research included age, years of residence in the city/neighborhood, education, ownership of residential house, citizen's participation in city affairs management, social interactions, and the citizens’ opinion about social security, and life satisfaction. …”
    Get full text
    Article
  15. 4295

    Survey of software anomaly detection based on deception by Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO

    Published 2022-02-01
    “…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
    Get full text
    Article
  16. 4296
  17. 4297
  18. 4298

    Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition by Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN

    Published 2023-06-01
    “…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
    Get full text
    Article
  19. 4299
  20. 4300

    Contemporary irregular migrations in the Republic of Serbia: Ethical normative aspects by Petrović Zoran

    Published 2024-01-01
    “…This paper examines global and regional trends in contemporary irregular migration, which reflect complex economic, political, social, and security factors, which, as such, reflect on the Republic of Serbia. …”
    Get full text
    Article