Showing 4,821 - 4,840 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4821

    Revocable identity-based proxy re-signature scheme in the standard model by Xiaodong YANG, Yutong LI, Jinli WANG, Tingchun MA, Caifen WANG

    Published 2019-05-01
    “…User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.…”
    Get full text
    Article
  2. 4822
  3. 4823

    Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review by S. Kumar Reddy Mallidi, Rajeswara Rao Ramisetty

    Published 2025-01-01
    “…Abstract As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. …”
    Get full text
    Article
  4. 4824

    Emergency Water Supply Dispatching Model for Saving and Storing Fresh Water in River Network Areas Influenced by Saltwater Intrusion by DING Bo, HE Xinchun, WANG Cuiting, WANG Linghe

    Published 2025-01-01
    “…Besides, when the salinity of Modaomen Waterway exceeds the standard level, Tielushan Reservoir is employed to drain the fresh water and regulate the salinity, which can further improve the water supply security and alleviate the influence of saltwater intrusion.…”
    Get full text
    Article
  5. 4825
  6. 4826

    Digital Literacy Education Among Students: Status, Pathways, and Implications in the Current Digital Era by Wang Yi, Wang Siqian

    Published 2025-02-01
    “…However, students from urban areas demonstrate significantly higher digital literacy levels compared to those from rural areas, particularly in security and privacy domains. The findings underscore the need for targeted interventions to enhance digital literacy in areas such as digital content creation and problem-solving. …”
    Get full text
    Article
  7. 4827

    Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review by Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta

    Published 2024-01-01
    “…The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
    Get full text
    Article
  8. 4828

    Optimalisasi Strategi Idarah: Studi Kasus Pengelolaan Masjid Agung Kauman di Kota Semarang by Miftahul Fadilah, Bima Fandi Asy'arie, Abdul Latif

    Published 2024-06-01
    “…The data obtained are: First, the blood of the Great Mosque of Kauman Semarang can be said to be good, because from the data collected with the daily mosque secretary there are security guards and marbots who handle mosque security and administration runs in an orderly manner. …”
    Get full text
    Article
  9. 4829

    Ungoverned Spaces and Menace of Herder-Farmer Conflictin Ondo State, South West Nigeria by Adebajo Adeola Aderayo, Orebanjo Abiodun Olusola

    Published 2023-03-01
    “…Drones can be deployed to monitor the operation of herders in the forests. Amotekun security outfit should be trained and adequately equipped with weapons for maximum delivery.…”
    Get full text
    Article
  10. 4830
  11. 4831

    Ear Biometric Identification based on Gabor Filters using Backpropagation Neural Networks by Ivano Kumaran, Muchtar Ali Setyo Yudono, Alun Sujjada

    Published 2024-11-01
    “…The development of reliable security systems is crucial for protecting personal information and access control. …”
    Get full text
    Article
  12. 4832

    Comparison of Insertion Characteristics of Prewarmed Igel and I-gel at Room Temperature in Adult Patients Undergoing Elective Surgeries- A Randomized Control Trial by Priyanka Pathak, Mushtaq Wani, Heena Saini

    Published 2025-01-01
    “…In Group C, airway was secured with Igel at room temperature. In Group W, patients airway was secured with I-gel which was prewarmed at 42˚Celsius. …”
    Get full text
    Article
  13. 4833

    High-performance directional fuzzing scheme based on deep reinforcement learning by Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU

    Published 2023-04-01
    “…With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.…”
    Get full text
    Article
  14. 4834

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…A unique feature that makes this method well-suited to large enrollment classes is the ability to secure and, when necessary, to delete stolen work, thereby precluding misappropriation. …”
    Get full text
    Article
  15. 4835
  16. 4836

    Review of malware detection and classification visualization techniques by Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA

    Published 2023-10-01
    “…With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.…”
    Get full text
    Article
  17. 4837

    Breeding Maize (Zea mays L.) for Aluminum Tolerance through Heterosis and Combining Ability by Fekadu Asfawu, Gomathi Nayagam, Edossa Fikiru, Girum Azmach

    Published 2024-01-01
    “…Soil acidity, a major threat to food security in developing countries, can cause a staggering 71% decline in maize (Zea mays L.) production. …”
    Get full text
    Article
  18. 4838

    An Analysis of the Legal Standard in the Fight Against Torture and Treatment of Prisoners under International Law: What Prospect for Application under Cameroonian Law? by N. V. Minang, N. C. Nguindip

    Published 2020-02-01
    “…Cameroon in its compliance with the international standard set, has contributed enormously by enacting credible laws which varies from its constitution, criminal codes, and other relevant provision all in the aim of safeguarding and ensuring that this right should be treated with lots of human protection and security. Even though with efforts laid in place by the country through its various legal and institutional dispositions, prohibition and protection has continued to be considered as a nightmare, as we continue in experiencing violations of this fundamental right by those who were vested with the powers and competent in ensuring and securing this sacred right. …”
    Get full text
    Article
  19. 4839

    Slope Reinforcement Mechanism and Stability Analysis of <italic>Ophiopogon bodinieri</italic> Under Rainfall Conditions by GUO Jianjun, ZhangWei, CaoHeng, WuZhenwei

    Published 2024-01-01
    “…The displacement of slope surface soil and the security coefficient of slope under different rainfall conditions were analyzed. …”
    Get full text
    Article
  20. 4840