Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4321
Task-based access control mode of peer-to-peer network based on fuzzy theory
Published 2017-02-01“…The opening and self-organization features of P2P network brings a series of security risks,andthe traditional access control model is not suitable for P2P network as it is a kind of distributed management system.Task-based access control mode of P2P network was proposed based on fuzzy theory.And the formalization description and analysis of the model was also proposed.The risk value of each transaction was calculated through hierarchy process analysis and fuzzy comprehensive evaluation.In this model,according to the risk value of each transaction,the dynamic management of ac-cess authority was realized by extending task-basedaccess control model.The results show that this model can restrain the success of noncooperative nodes transaction and raise the success of the whole P2P network system transaction,thus improving the security of P2P network system.…”
Get full text
Article -
4322
Research on Image Recognition and Classification Algorithms in Cloud Computing Environment Based on Deep Neural Networks
Published 2025-01-01“…Image recognition provides an essential role in many areas of modern life, such as security, video analysis, healthcare, and autonomous vehicles. …”
Get full text
Article -
4323
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01“…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
Get full text
Article -
4324
Overview of the key technology of photonic firewall at high speed
Published 2019-09-01“…In order to maintain the security of optical network,it is urgent to research and deploy photonic firewall which can effectively process high-speed optical signals to replace existing electronic firewall which consumes high energy.After a brief review of the principle of photonic firewall,the pattern matching technology based on correlation operation and all-optical logic gates were summarized,and the matching systems was compared according to their advantages and disadvantages.Besides,the realization methods of all-optical logic gates were introduced.Finally,the next research direction and development trend of all-optical pattern matching were prospected:more efficient system structure or non-linear devices with faster response speed.The survey shows that photonic firewall based on all-optical pattern matching has a good application prospect in network security.…”
Get full text
Article -
4325
Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network
Published 2023-03-01“…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
Get full text
Article -
4326
PHYSICAL LAYER SECRECY ON WIRELESS NETWORK
Published 2016-06-01“…In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using any coding solution on application layer. …”
Get full text
Article -
4327
PhishingAgent: an agentic workflow method for advanced phishing email detection
Published 2024-11-01“…PhishingAgent integrated multi-source knowledge bases and security tools to fully leverage the reasoning capabilities of large language model (LLM), enhancing the precision and depth of identifying complex phishing email attacks. …”
Get full text
Article -
4328
Community field-centric trust-based access control model
Published 2013-09-01“…Context-aware interaction and cooperation among agents provids digital community services.However,it also brings new problems of secure access.A novel community field-centric trust-based access control model (referred to as the CTBAC) was developed by thoroughly considering both the trust level of agent and the cooperation among agents inside and outside of community fields in digital commun ty.There are two novel ingredients.Firstly,a community field was established in terms of agent’s own contexts and trust certificate.Thus,the trust level could be dynamically adjusted based on the sessions.Secondly,the activation and use of access control permissions according to the match relationship between the trust level of agents and trust threshold.The proposed CTBAC model was compared to several access control models and its effectiveness in both dynamic permission control and security protection was demonstrated.…”
Get full text
Article -
4329
The constitution of war in the Middle East
Published 2025-01-01“…This study aims to examine the constitutional systems that provide authorization for war in the Middle East, assessing their impact on regional and global peace, security, accountability, and the safeguarding of human rights. …”
Get full text
Article -
4330
BRICS in a world at crossroads?
Published 2023-07-01“…In the process, the west has threatened the strategic security of Russia and Russia has also flouted the national sovereignty of its western neighbours that the West tries to use to bring Russia into submission. …”
Get full text
Article -
4331
ID-based server-aided verification signature scheme with strong unforgeability
Published 2016-06-01“…Most identity-based signature schemes in the standard model are existentially unforgeable,which cannot prevent adversaries from forging valid signatures on messages that have previously been signed.However,signature verification algorithms of ID-based signature schemes in the standard model require expensive bilinear pairing operations.In order to overcome the shortcomings of the existing ID-based signature schemes such as strong security assumption and high computation cost,a strongly unforgeable ID-based server-aided verification signature scheme was presented.This scheme was proven to be secure under collusion attacks,adaptive chosen identity and message attacks in the standard model.Analysis results show that the proposed scheme effectively reduces computation cost of pairing operation,and it greatly reduces computational complexity of signature verification algorithm.The proposed scheme is more efficient than the existing ID-based signature schemes.…”
Get full text
Article -
4332
Mimic defense authentication method for physical access control
Published 2020-06-01“…To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.…”
Get full text
Article -
4333
A spatial diversity cooperative spectrum sensing system based on blockchain and deep learning
Published 2023-10-01“…Cooperative spectrum sensing is a key technology in cognitive radio.A data-driven intelligent cooperative spectrum sensing system was proposed with spatial diversity running on a smart contract to address issues of security, privacy, incentive and hidden terminals in cooperative spectrum sensing.Specifically, a motivated spectrum sensing system was designed by taking advantage of the decentralization of blockchain technology and the immutability of data.Secondly, a deep learning-based approach was proposed to identify malicious users in the system.In addition, to achieve higher accuracy in recruiting sensing nodes more efficiently in the system, a hard decision cooperative spectrum sensing fusion algorithm based on performance weights and spatial diversity was designed.The experimental results indicate that the proposed solution outperforms traditional cooperative spectrum sensing algorithms in terms of security, privacy, motivation, and sensing accuracy.…”
Get full text
Article -
4334
Feasibility and parameter optimization of ground-to-satellite uplink continuous-variable quantum key distribution
Published 2025-01-01“…Driven by the necessitates of wide-area quantum secure communication networks, ground-to-satellite quantum key distribution (QKD) has been highlighted in the field of quantum information. …”
Get full text
Article -
4335
Reinforcement learning based group key agreement scheme with reduced latency for VANET
Published 2020-10-01“…Key agreement scheme of vehicle ad hoc networks (VANET) determines the privacy and security against user identity-based attacks,such as spoofing attack.The existing work updates the group shared key at a fixed frequency,which increases the processing latency of the key updates and the encryption and decryption of group communication.A reinforcement learning based dynamic key agreement scheme was proposed to enable the group cluster head to optimize the key update frequency and key length.This scheme optimizes the calculation latency of encryption and decryption based on the number of surrounding vehicles,the previous key update records without the knowledge of the traffic flow model and the access-driven cache attack model.Simulation results show that this scheme reduces the transmission delay of the communication overhead and the computational latency of encryption and decryption,and improves the security of the group key compared with the benchmark scheme.…”
Get full text
Article -
4336
Modeling Peer-to-Peer Botnet on Scale-Free Network
Published 2014-01-01“…Our findings can provide meaningful instruction to network security management.…”
Get full text
Article -
4337
Evaluating the Efficiency and Reliability of Fertilizer Subsidy Systems: The Role of Blockchain in Driving Enhancements in Tanzania
Published 2025-02-01“…The proposed hybrid architecture integrates well-structured algorithms to improve operational efficiency and ensure a more secure and fair distribution system. These findings underscore the urgent need for novel approaches to improve agricultural productivity and food security, advocating for the widespread adoption of blockchain technology within the agricultural sector. …”
Get full text
Article -
4338
PASSENGERS’ SATISFACTION WITH THE LAGOS SHUTTLE TRAIN SERVICES, LAGOS, NIGERIA
Published 2023-09-01“…Generally, passengers were satisfied with accessibility, coverage, fare, safety at station and onboard, security at station, and security of luggage; however, the Lagos Shuttle Train Services was found wanting on several key indicators. …”
Get full text
Article -
4339
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
4340
Leakage-resilient certificateless signcryption scheme
Published 2017-11-01“…In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless signcryption scheme based on Elliptic Curve Cryptography and bilinear pairing was presented.In the random oracle,proved that the security of the scheme is based on the decisional Diffie-Hellman assumption.The scheme is also proved semantically secure against adaptive posterior chosen-ciphertext key-leakage attacks (KL-CCA2),and existentially unforgeable against chosen-message key-leakage attacks(KL-CMA).The proposed scheme was free from non-interactive zero knowledge proof system and needs no bilinear paring operation in signcryption phase.Compared with other schemes of the same kind,the proposed scheme can resist key-leakage attacks and maintains high efficiency.…”
Get full text
Article