Showing 4,421 - 4,440 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 4421

    Data management based on blockchain and edge computing for Internet of things by Guanjie CHENG, Zhengjie HUANG, Shuiguang DENG

    Published 2020-06-01
    “…The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.…”
    Get full text
    Article
  2. 4422

    Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback by Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG

    Published 2022-02-01
    “…Aiming at the security problem of edge server, a trust evaluation algorithm was proposed, which integrated server cooperation reputation and device user feedback to improve the security of edge computing context.In the process of interaction, a fusion algorithm based on objective information entropy theory was used to aggregate the cooperation reputation between servers, and a partial homomorphic encryption algorithm was used to prevent the leakage of user data in the process of interaction.After the interaction, the highly trusted device node was selected to calculate the feedback trust, which overcame the malicious feedback of the traditional mechanism.When calculating the global trust, the expected score of the server and the adaptive weight calculation method were considered, which overcame the limitations of the traditional trust scheme.The experimental results show that the proposed trust calculation scheme has low time complexity and spatial complexity, and can effectively resist the attack of malicious nodes.…”
    Get full text
    Article
  3. 4423

    Certificate-based cross-domain authentication scheme with anonymity by Yongshan DING, Lixin LI, Zuohui LI

    Published 2018-05-01
    “…Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature (CBS) algorithm was proposed,and the security of the proposed CBS scheme was proved.The verification result of the signature in the algorithm was constant,which ensured the anonymity of the authentication entities in the cross-domain process.The algorithm does not contain pairing,and avoids complex certificate management in traditional PKI and the key escrow and distribution of IBS.Then a cross-domain authentication scheme for mobile devices was constructed by combining the proposed signature algorithm.The scheme ensures the anonymity of authentication at the same time.Finally,compared with other schemes,the scheme proposed is more secure and has less computation cost and communication cost.Moreover,the scheme is simple and efficient,and could be applied to the cross-domain authentication of mobile devices.…”
    Get full text
    Article
  4. 4424

    Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature by LIU Zhaoman, YANG Yafang, NING Jianting, ZHAO Yunlei

    Published 2024-11-01
    “…Furthermore, the proposed scheme deployed the sanitizability function on road-side units (RSU) and proposed an efficient pseudonym certificate distribution scheme. Security analysis shows that the scheme effectively resists correlation and impersonation attacks, with minimal computational overhead on RSU and vehicles, ensuring good efficiency and security during pseudonym certificate and anonymous authentication processes.…”
    Get full text
    Article
  5. 4425

    Parallel remote state preparation for fully device-independent verifiable blind quantum computation by Sean A. Adamson

    Published 2025-01-01
    “…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. …”
    Get full text
    Article
  6. 4426
  7. 4427

    The Construction of the Evaluation Index for the Outgoing Auditing of the Natural Resource Assets of Local Leading Cadres Based on the Analytic Hierarchy Process by Jiali Xuan

    Published 2022-01-01
    “…As the foundation of human survival and development, natural resources affect every aspect of our lives, including life and health, financial security, and overall social security. This article describes building a system for valuing the assets of good NR in operation for local executives who employ analytic hierarchy process. …”
    Get full text
    Article
  8. 4428

    Walkshop ‘Nuclear risks and long-term peacekeeping’: 26.06.2025 – 01.07.2025 by IGJR-Editors

    Published 2024-12-01
    “… Since 2021, the FRFG has organised Walkshops on the topics social security and intergenerational contracts, atomic waste, the coal phase-out, and climate change. …”
    Get full text
    Article
  9. 4429

    Leveraging Cloud Technology for Personalized Multiple Sclerosis Care: A Comprehensive Data Management and Visualization Approach by Jose Manuel PINILLOS RUBIO, Minerva VIGUERA MORENO

    Published 2024-11-01
    “… This project develops a cloud-based solution for securely managing clinical data and patient-reported outcomes (PROMs) for multiple sclerosis (MS) patients. …”
    Get full text
    Article
  10. 4430

    Aligning policy for success in developing countries: evidence from the poultry sector of Ghana by Omid Zamani, Craig Chibanda, Mavis Boimah, Collins Asante-Addo

    Published 2025-02-01
    “…Specifically, our study emphasizes the importance of striking a balance between fostering domestic production and ensuring food security.…”
    Get full text
    Article
  11. 4431

    A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0 by Ali Memarpour Ghiaci, Jafar Gheidar-Kheljani

    Published 2024-03-01
    “…Cyber security issues have become a complex challenge for companies that obligating to Industry 4.0 paradigm. …”
    Get full text
    Article
  12. 4432

    Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia by Genet Gelana Kabeta, S G Pretorius

    Published 2023-06-01
    “…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
    Get full text
    Article
  13. 4433

    A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things by Yang Yang, Min Lin, Yangfei Lin, Chen Zhang, Celimuge Wu

    Published 2025-01-01
    “…The findings suggest that blockchain technology not only improves data security and trustworthiness but also opens new avenues for efficient and transparent management in agriculture and animal husbandry.…”
    Get full text
    Article
  14. 4434

    Explaining the Role of Geopolitical Components Affecting spatial planning of border regions (Case Study: West Azarbaijan Province) by Ahmad Aftab, Ali Majnoony, Akbar Houshmand

    Published 2022-06-01
    “…Therefore, according to the findings of the research, it is suggested that security and security measures are implemented with economic, political, and socio-cultural approaches.…”
    Get full text
    Article
  15. 4435

    Circuit Implementation, Synchronization of Multistability, and Image Encryption of a Four-Wing Memristive Chaotic System by Guangya Peng, Fuhong Min, Enrong Wang

    Published 2018-01-01
    “…The four-wing memristive chaotic system used in synchronization is applied to secure communication which can increase the difficulty of deciphering effectively and enhance the security of information. …”
    Get full text
    Article
  16. 4436

    Blockchain-based renewable energy certificate system in Indonesia by Indri Haryani, Indra Ardhanayudha Aditya, Almareta Harasti Nuraini, Sri Widiyanesti, Andry Alamsyah, Eva Nurhazizah, Muhammad Naufal Hakim, Tanti Ruwani, Mochamad Zaky Dwi Arli, Nadhif Ditertian Girawan

    Published 2025-02-01
    “…Results show that blockchain technology can revolutionize Indonesian REC market by improving security, traceability, and promote stakeholders' trust. …”
    Get full text
    Article
  17. 4437

    New forgery attack on the authenticated cipher SCREAM and iSCREAM by Yu-dan TIAN, Yong-zhuang WEI

    Published 2016-01-01
    “…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
    Get full text
    Article
  18. 4438

    Policing wildlife trafficking in northeastern Mexico: the case of Tamaulipas in 2023-2024 by José Luis Carpio-Domínguez, José Juan Cervantes-Niño, Jesús Ignacio Castro-Salazar, Violeta Mendezcarlo-Silva

    Published 2025-01-01
    “…Illegal wildlife trade is an environmental, economic, and social problem that threatens global public health and the security of countries. It is one of the main drivers of biodiversity loss on a global scale. …”
    Get full text
    Article
  19. 4439

    Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures by Stephanie Ness

    Published 2025-01-01
    “…The suggested framework strengthens smart grid immunity to cyber threats such as DoS attacks, back door injections, and adversarial perturbations while increasing energy distribution stability and security. For enhancing smart grid security, our results emphasize the importance of integration of ML and DL techniques and provide such an understanding of threat environment for future research and development on threat identification.…”
    Get full text
    Article
  20. 4440

    Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture by Xiaoying Huang, Zhichuan Guo, Mangu Song, Xuewen Zeng

    Published 2021-11-01
    “…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
    Get full text
    Article