Showing 4,621 - 4,640 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 4621

    Reconceptualizing Corruption as an International Crime: A Review of International Law by Satria Unggul Wicaksana Prakasa

    Published 2024-10-01
    “…The discourse surrounding corruption as an international crime is increasingly urgent, as it transcends national borders and contributes to economic crises, conflicts, and various crimes that threaten global security. Scholars such as Christensen (2017), Peters (2018), Davis (2018), and Rothe (2010) have linked corruption to human rights violations, revealing that states often struggle to address it effectively. …”
    Get full text
    Article
  2. 4622

    SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm by Junlong Shi

    Published 2023-01-01
    “…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
    Get full text
    Article
  3. 4623

    Survey of network-layer anonymous communication protocols by Liangmin WANG, Xiaoling NI, Hui ZHAO

    Published 2020-02-01
    “…An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding,content encryption,and traffic obfuscation to hide communication relationships between entities and forwarded contents.However,there is a deficiency in the balance between performance and security as an anonymous communication system operating over an overlay network.With the advance of the future internet architectures,it is possible to build an infrastructure-based anonymous communication system.Such anonymous communication systems design anonymity as network infrastructure services and provide encryption operations for routers,which can solve the part problem of scalability and performance limitations of anonymous network.They can also be called network-layer anonymous communication protocols.The existing network-layer anonymous communication protocols (LAP,Dovetail,Hornet,PHI and Taranet) were studied.The classification standard of network-layer anonymous communication protocols were introduced.Its innovation point and specific encryption ideas were briefly described,and how to keep balance between security and performance was analyzed.The shortcomings and advantages of these kinds of network anonymous communication protocols were also pointed out.Finally,the challenges faced in the development of anonymous communication systems and the problems that need to be studied in depth were proposed.…”
    Get full text
    Article
  4. 4624

    Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI

    Published 2017-10-01
    “…The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.…”
    Get full text
    Article
  5. 4625

    Azerbaijan’s Quest for Strategic Autonomy by Tabib Huseynov

    Published 2024-12-01
    “…The paper argues that Azerbaijan’s quest for strategic autonomy is both a response to external pressures and a means to assert agency within the broader Eurasian security landscape. It also describes Azerbaijan as a «geopolitical connector», capable of punching above its weight in contributing to international security, owing to its strategic location and diplomatic outreach across opposing blocs. …”
    Get full text
    Article
  6. 4626
  7. 4627

    Blockchain-based payment channel network: challenges and recent advances by XU Xiu, TIAN Anqi, HE Ruiwen

    Published 2024-10-01
    “…Based on this, this thesis refines the existing research results into security attacks, privacy vulnerabilities and difficult-to-implement system assumptions, conducts detailed research on the key challenges of the lightning network, and compares the existing solutions. …”
    Get full text
    Article
  8. 4628

    A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks by Ramzi Saifan, Omar Al-Jarrah

    Published 2010-12-01
    “…Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS). …”
    Get full text
    Article
  9. 4629

    Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity by Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG

    Published 2015-12-01
    “…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
    Get full text
    Article
  10. 4630

    Network threat situation assessment based on unsupervised multi-source data feature analysis by Hongyu YANG, Fengyan WANG

    Published 2020-02-01
    “…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
    Get full text
    Article
  11. 4631

    Evolutionary Game and Numerical Simulation of Cultivated Land Protection Policies Implementation in China by Xinhai Lu, Yanwei Zhang, Yucheng Zou

    Published 2021-01-01
    “…The effective implementation of cultivated land protection policies (CLPP) has important practical significance for improving China’s food security and ecological security. The central government, local governments, and farmers have mutually restricted and influencing interest relations. …”
    Get full text
    Article
  12. 4632

    Zero trust management of data flow between IoT edge nodes based on SDN by XIAO Jingxu, GUO Yuanbo, CHANG Chaowen, WU Ping, YANG Chenli

    Published 2024-07-01
    “…In the forwarding path, the security verification of packets was performed by the switching node, and the verification information was counted to ensure the security of the data flow transmission and the consistency of the path. …”
    Get full text
    Article
  13. 4633
  14. 4634

    Favela, criminalité violente et politique à Rio de Janeiro by Luiz Antonio Machado da Silva

    Published 2016-10-01
    “…The superposition of the "everyday security problem" to "slum problem" reproduces the traditional processes of spatial segregation, but now with a widespread "fear of the next" and the presence in the favelas gang drugs, which significantly reduces the chances of maintaining local collective action and the popularization of their requests.…”
    Get full text
    Article
  15. 4635

    Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography by Lili Wang

    Published 2014-01-01
    “…Finally, we compare our enhancement with related works to illustrate that the improvement is more secure and robust, while maintaining low performance cost.…”
    Get full text
    Article
  16. 4636

    Method for generating pseudo random numbers based on cellular neural network by Li-hua DONG, Guo-li YAO

    Published 2016-10-01
    “…To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.…”
    Get full text
    Article
  17. 4637
  18. 4638

    DIAGNOSTIC EVALUATION OF URBAN METRO TRANSIT SYSTEM POST-COVID-19 by Salman KHURSHEED, Shagufta YASMIN

    Published 2024-09-01
    “…The survey covers commuter perceptions of safety & security, financial & economic factors, infrastructure & comfort and functional & operational features. …”
    Get full text
    Article
  19. 4639

    Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks by Hae Young Lee

    Published 2015-01-01
    “…The existing solutions are vulnerable to such a type of security attacks, called manipulated compilation attacks (MCAs), since they assume that CHs are uncompromised. …”
    Get full text
    Article
  20. 4640

    Second-degree branch structure blockchain expansion model by Qiang Liu, Baoyan Song, Junlu Wang

    Published 2022-03-01
    “…Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. …”
    Get full text
    Article