Showing 4,321 - 4,340 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 4321

    Task-based access control mode of peer-to-peer network based on fuzzy theory by Hao LIU, Lian-ming ZHANG, Zhi-gang CHEN

    Published 2017-02-01
    “…The opening and self-organization features of P2P network brings a series of security risks,andthe traditional access control model is not suitable for P2P network as it is a kind of distributed management system.Task-based access control mode of P2P network was proposed based on fuzzy theory.And the formalization description and analysis of the model was also proposed.The risk value of each transaction was calculated through hierarchy process analysis and fuzzy comprehensive evaluation.In this model,according to the risk value of each transaction,the dynamic management of ac-cess authority was realized by extending task-basedaccess control model.The results show that this model can restrain the success of noncooperative nodes transaction and raise the success of the whole P2P network system transaction,thus improving the security of P2P network system.…”
    Get full text
    Article
  2. 4322

    Research on Image Recognition and Classification Algorithms in Cloud Computing Environment Based on Deep Neural Networks by Zheshu Jia

    Published 2025-01-01
    “…Image recognition provides an essential role in many areas of modern life, such as security, video analysis, healthcare, and autonomous vehicles. …”
    Get full text
    Article
  3. 4323

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article
  4. 4324

    Overview of the key technology of photonic firewall at high speed by Shanguo HUANG, Xin LI, Ying TANG, Junfeng GUO

    Published 2019-09-01
    “…In order to maintain the security of optical network,it is urgent to research and deploy photonic firewall which can effectively process high-speed optical signals to replace existing electronic firewall which consumes high energy.After a brief review of the principle of photonic firewall,the pattern matching technology based on correlation operation and all-optical logic gates were summarized,and the matching systems was compared according to their advantages and disadvantages.Besides,the realization methods of all-optical logic gates were introduced.Finally,the next research direction and development trend of all-optical pattern matching were prospected:more efficient system structure or non-linear devices with faster response speed.The survey shows that photonic firewall based on all-optical pattern matching has a good application prospect in network security.…”
    Get full text
    Article
  5. 4325

    Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network by Li JIANG, Shengli XIE, Hui TIAN

    Published 2023-03-01
    “…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
    Get full text
    Article
  6. 4326

    PHYSICAL LAYER SECRECY ON WIRELESS NETWORK by Trương Tiến Vũ, Trần Đức Dũng, Hà Đắc Bình, Võ Nhân Văn

    Published 2016-06-01
    “…In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using any coding solution on application layer. …”
    Get full text
    Article
  7. 4327

    PhishingAgent: an agentic workflow method for advanced phishing email detection by JIN Jiandong, HUANG Zheng, HU Zhanyu, ZOU Yuanxin, QIN Huidong, LAI Qingnan, YANG Jia, ZHOU Changling

    Published 2024-11-01
    “…PhishingAgent integrated multi-source knowledge bases and security tools to fully leverage the reasoning capabilities of large language model (LLM), enhancing the precision and depth of identifying complex phishing email attacks. …”
    Get full text
    Article
  8. 4328

    Community field-centric trust-based access control model by Zhi-qiang YAO, Jin-bo XIONG, Jian-feng MA, Qi LI, Xi-meng LIU

    Published 2013-09-01
    “…Context-aware interaction and cooperation among agents provids digital community services.However,it also brings new problems of secure access.A novel community field-centric trust-based access control model (referred to as the CTBAC) was developed by thoroughly considering both the trust level of agent and the cooperation among agents inside and outside of community fields in digital commun ty.There are two novel ingredients.Firstly,a community field was established in terms of agent’s own contexts and trust certificate.Thus,the trust level could be dynamically adjusted based on the sessions.Secondly,the activation and use of access control permissions according to the match relationship between the trust level of agents and trust threshold.The proposed CTBAC model was compared to several access control models and its effectiveness in both dynamic permission control and security protection was demonstrated.…”
    Get full text
    Article
  9. 4329

    The constitution of war in the Middle East by Samad Zangana, Oudha Yousif, Anas Akram Mohammed Subhi Abbas, Aqeel Nadea Abdulateef

    Published 2025-01-01
    “…This study aims to examine the constitutional systems that provide authorization for war in the Middle East, assessing their impact on regional and global peace, security, accountability, and the safeguarding of human rights. …”
    Get full text
    Article
  10. 4330

    BRICS in a world at crossroads? by Siphamandla Zondi, Norman Sempijja, Thulisile Mphambukeli

    Published 2023-07-01
    “…In the process, the west has threatened the strategic security of Russia and Russia has also flouted the national sovereignty of its western neighbours that the West tries to use to bring Russia into submission. …”
    Get full text
    Article
  11. 4331

    ID-based server-aided verification signature scheme with strong unforgeability by Xiao-dong YANG, Miao-miao YANG, Guo-juan GAO, Ya-nan LI, Xiao-yong LU, Cai-fen WANG

    Published 2016-06-01
    “…Most identity-based signature schemes in the standard model are existentially unforgeable,which cannot prevent adversaries from forging valid signatures on messages that have previously been signed.However,signature verification algorithms of ID-based signature schemes in the standard model require expensive bilinear pairing operations.In order to overcome the shortcomings of the existing ID-based signature schemes such as strong security assumption and high computation cost,a strongly unforgeable ID-based server-aided verification signature scheme was presented.This scheme was proven to be secure under collusion attacks,adaptive chosen identity and message attacks in the standard model.Analysis results show that the proposed scheme effectively reduces computation cost of pairing operation,and it greatly reduces computational complexity of signature verification algorithm.The proposed scheme is more efficient than the existing ID-based signature schemes.…”
    Get full text
    Article
  12. 4332

    Mimic defense authentication method for physical access control by Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, Feng FENG

    Published 2020-06-01
    “…To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.…”
    Get full text
    Article
  13. 4333

    A spatial diversity cooperative spectrum sensing system based on blockchain and deep learning by Zhongshan XIAO, Chunqi WANG, Daquan FENG

    Published 2023-10-01
    “…Cooperative spectrum sensing is a key technology in cognitive radio.A data-driven intelligent cooperative spectrum sensing system was proposed with spatial diversity running on a smart contract to address issues of security, privacy, incentive and hidden terminals in cooperative spectrum sensing.Specifically, a motivated spectrum sensing system was designed by taking advantage of the decentralization of blockchain technology and the immutability of data.Secondly, a deep learning-based approach was proposed to identify malicious users in the system.In addition, to achieve higher accuracy in recruiting sensing nodes more efficiently in the system, a hard decision cooperative spectrum sensing fusion algorithm based on performance weights and spatial diversity was designed.The experimental results indicate that the proposed solution outperforms traditional cooperative spectrum sensing algorithms in terms of security, privacy, motivation, and sensing accuracy.…”
    Get full text
    Article
  14. 4334

    Feasibility and parameter optimization of ground-to-satellite uplink continuous-variable quantum key distribution by Jin Cheng, Yujie Chen, Ao Liu, Xin Sun, Junjie Guo, Bohan Yang, Peng Yin, Wenbo Liu, Lanjian Chen, Chen Dong

    Published 2025-01-01
    “…Driven by the necessitates of wide-area quantum secure communication networks, ground-to-satellite quantum key distribution (QKD) has been highlighted in the field of quantum information. …”
    Get full text
    Article
  15. 4335

    Reinforcement learning based group key agreement scheme with reduced latency for VANET by Tangwei1 XU, Hailu ZHANG, Chuhuan LIU, Liang XIAO, Zhenmin ZHU

    Published 2020-10-01
    “…Key agreement scheme of vehicle ad hoc networks (VANET) determines the privacy and security against user identity-based attacks,such as spoofing attack.The existing work updates the group shared key at a fixed frequency,which increases the processing latency of the key updates and the encryption and decryption of group communication.A reinforcement learning based dynamic key agreement scheme was proposed to enable the group cluster head to optimize the key update frequency and key length.This scheme optimizes the calculation latency of encryption and decryption based on the number of surrounding vehicles,the previous key update records without the knowledge of the traffic flow model and the access-driven cache attack model.Simulation results show that this scheme reduces the transmission delay of the communication overhead and the computational latency of encryption and decryption,and improves the security of the group key compared with the benchmark scheme.…”
    Get full text
    Article
  16. 4336

    Modeling Peer-to-Peer Botnet on Scale-Free Network by Liping Feng, Hongbin Wang, Qi Han, Qingshan Zhao, Lipeng Song

    Published 2014-01-01
    “…Our findings can provide meaningful instruction to network security management.…”
    Get full text
    Article
  17. 4337

    Evaluating the Efficiency and Reliability of Fertilizer Subsidy Systems: The Role of Blockchain in Driving Enhancements in Tanzania by O. D. Mbita, M. R. Nicholaus, R. K. Twahir

    Published 2025-02-01
    “…The proposed hybrid architecture integrates well-structured algorithms to improve operational efficiency and ensure a more secure and fair distribution system. These findings underscore the urgent need for novel approaches to improve agricultural productivity and food security, advocating for the widespread adoption of blockchain technology within the agricultural sector. …”
    Get full text
    Article
  18. 4338

    PASSENGERS’ SATISFACTION WITH THE LAGOS SHUTTLE TRAIN SERVICES, LAGOS, NIGERIA by Olorunfemi Ayodeji OLOJEDE, Sikiru Akintunde FOLORUNSO, Adewale Sheyi POPOOLA, Peter Bolaji OLADEJI, Olamide AKINTIFONBO, Damilare Jeremiah ODEYEMI

    Published 2023-09-01
    “…Generally, passengers were satisfied with accessibility, coverage, fare, safety at station and onboard, security at station, and security of luggage; however, the Lagos Shuttle Train Services was found wanting on several key indicators. …”
    Get full text
    Article
  19. 4339

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  20. 4340

    Leakage-resilient certificateless signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU

    Published 2017-11-01
    “…In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless signcryption scheme based on Elliptic Curve Cryptography and bilinear pairing was presented.In the random oracle,proved that the security of the scheme is based on the decisional Diffie-Hellman assumption.The scheme is also proved semantically secure against adaptive posterior chosen-ciphertext key-leakage attacks (KL-CCA2),and existentially unforgeable against chosen-message key-leakage attacks(KL-CMA).The proposed scheme was free from non-interactive zero knowledge proof system and needs no bilinear paring operation in signcryption phase.Compared with other schemes of the same kind,the proposed scheme can resist key-leakage attacks and maintains high efficiency.…”
    Get full text
    Article