Showing 5,541 - 5,560 results of 9,720 for search '"Securities ', query time: 0.17s Refine Results
  1. 5541

    Research on dynamic migration of critical virtual machines for multi-tenancy by Shuo ZHAO, Xin-sheng JI, Guo-zhen CHENG, Yu-xing MAO

    Published 2017-08-01
    “…A dynamic migration method of critical virtual machines for multi-tenancy was proposed.Firstly,the tenants can set ratio of critical virtual machines according to tenant's security requirements,then the dynamic migration frequency of virtual machines were maximized by the coexistence time constraints between virtual machines,finally the migration cost was minimized as an object function for the virtual machines migrated to further reduce the migration cost.Simulation experiments demonstrate that the proposed approach can reduce the impact on the performance of network services and the cost of virtual machines migration,and is more suitable for large-scale network scenarios under the premise of effective defense side-channel attacks.…”
    Get full text
    Article
  2. 5542

    Research on anonymous identity authentication technology in Fabric by Yueyang YE, Xinglan ZHANG

    Published 2021-06-01
    “…Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain.A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger Fabric platform, a typical representative of the consortium blockchain.By splitting the private key d into two parts, different roles use each private key to generate the joint signature of the anonymous certificate to achieve the separation of permissions in the process of certificate generation and solve the single point attack problem in the process of anonymous certificate tracking.The analysis shows that the improved scheme can achieve higher security than the original scheme with lower computing and storage overhead.…”
    Get full text
    Article
  3. 5543

    P2P network identity authentication mechanism based on trusted alliance by Yingying CHEN, Feng ZHANG, Wenbao JIANG, Xu ZHOU

    Published 2020-04-01
    “…In order to effectively solve the problems of CA's cross certification and single point of failure in traditional PKI system,a new identity authentication mechanism was proposed.Firstly,this mechanism built the basic architecture based on blockchain,and built the trusted alliance by dynamically generating trusted nodes.Secondly,the whole network unified unique identity was proposed and used a new data structure,named SRT,to store.Finally,all nodes in the network could mutual authentication through the double layer consensus mechanism.Experiments show that this mechanism can meet the query and management of massive user identity information,and ensure the efficiency and security in the identity authentication process.…”
    Get full text
    Article
  4. 5544

    « Monstreuses » : biotechnologies, figures et fictions féministes dans le récit bref de science-fiction by Michèle Soriano

    Published 2020-12-01
    “…» requires agreements, moves, translations and connections, but we are freeing from paranoia, segregation, borders and invaders, security policies and redeeming apocalypses.…”
    Get full text
    Article
  5. 5545

    Thoughts on the Digital Transformation of Teaching in Chinese Higher Education by Huang Jiatao

    Published 2024-01-01
    “…Subsequently, it puts forward coping strategies such as strengthening technical training, optimizing resource integration, innovating teaching models, enhancing data security, and promoting educational equality and inclusiveness, aiming to promote the smooth progress of digital teaching transformation in higher education.…”
    Get full text
    Article
  6. 5546

    Tsurumi Shunsuke et les frontières du pragmatisme, 1945-1960 by Michael Lucken

    Published 2024-12-01
    “…Less well known, however, is his philosophical work in the early part of his career, between the end of the Second World War and the renewal of the Japan-US Security Treaty. This article explores this seminal period, during which he contributed to the introduction of American pragmatism to Japan, before adopting a much more critical stance towards it. …”
    Get full text
    Article
  7. 5547

    Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks by Tamás Holczer, Levente Buttyán

    Published 2011-10-01
    “…More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. …”
    Get full text
    Article
  8. 5548

    Improve the robustness of algorithm under adversarial environment by moving target defense by Kang HE, Yuefei ZHU, Long LIU, Bin LU, Bin LIU

    Published 2020-08-01
    “…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
    Get full text
    Article
  9. 5549

    Lightweight integrity verification scheme for cloud based group data by Yun-fei LIU, Yong-jun WANG, UShao-jing F

    Published 2016-10-01
    “…In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.…”
    Get full text
    Article
  10. 5550

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  11. 5551

    Cryptanalysis of a hybrid-structured onion routing scheme by Long-hai LI, Shao-feng FU, Rui-dan SU, Xiang-quan CHE

    Published 2013-04-01
    “…SHI Jin-qiao et al's hybrid-structured onion routing scheme was analysed and some security flaws were found in their design.The first flaw was derived from the malleability of its cryptographic message format which could be exploited by attackers to redirect an onion message or embed tags into it for tracing its routing path.The second flaw was the vulnerability of relay servers to chosen ciphertext attack.Three different attacks were presented that each broke the sender-receiver unlinkability entirely at a relatively low co To evade these attacks,a modified scheme was also proposed which could capture malicious nodes by using upstream investigation.…”
    Get full text
    Article
  12. 5552

    TRUST IN THE SYSTEM OF INTERACTION OF PARTICIPANTS OF THE MARKET IN CONDUCTING CALCULATIONS WITH THE USE OF ALTERNATIVE MEANS OF PAYMENT IN THE SYSTEM OF THE FUEL AND ENERGY COMPLE... by O. Baikova, D. Kulakov

    Published 2017-07-01
    “…Possibilities of activization of innovative development of resource trade as one of major factors of increase in security of fuel and energy complex and all Russian economy in general are revealed.…”
    Get full text
    Article
  13. 5553

    Attribute-based encryption with hidden policies in the access tree by Yan SONG, Zhen HAN, Feng-mei LIU, Lei LIU

    Published 2015-09-01
    “…The existing policies-hidden attribute-based encryption (ABE) schemes could only support a limited access structure,which resulted in weak expressiveness.A new structure of access tree was thus proposed to integrate attribute hiding and secret sharing into “and” gate,“or” gate and “threshold” gate.Then,a tree-based policies-hidden scheme was constructed by using composite order bilinear groups.Under dual system encryption,the scheme was proved to be secure.Furthermore,the analysis and experiment demonstrate that the scheme realize policies-hidden in the complex ac-cess structure without increasing the overhead of computation.As a result,it is more feasible and flexible for applica-tions.…”
    Get full text
    Article
  14. 5554

    Integrity verification protocol based on privacy homomorphism data aggregation by Xing LI, Chun-yan LI, Liang-min WANG

    Published 2014-11-01
    “…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
    Get full text
    Article
  15. 5555

    Sovereign Debt Restructurings in Grenada: Causes, Processes, Outcomes, and Lessons Learned by Tamon Asonuma, Mike Xin Li, Michael G. Papaioannou, Saji Thomas, Eriko Togo

    Published 2018-08-01
    “…However, the first restructuring was not able to secure long-term debt sustainability. Grenada’s restructuring experience shows the importance of (1) establishing appropriate debt restructuring objectives; (2) committing to policy reforms and maintaining ownership of the restructuring goals; and (3) engaging closely and having clear communications with creditors.…”
    Get full text
    Article
  16. 5556

    Piracy around the Horn of Africa by Joshua Ho

    Published 2009-09-01
    “…Piracy around the Horn of Africa has risen to a level serious enough for the international community to take concerted action to secure an international sea lane. However, the efforts so far have been initiated mainly by the international community while regional efforts are only just beginning. …”
    Get full text
    Article
  17. 5557

    Multi-biometrics fusion based on dynamic weighting of characteristic signal quality by Wenbing ZHANG, Peishun LIU, Fenghui XUE

    Published 2018-03-01
    “…Face recognition and speaker recognition were integrated at the decision-making level.In order to cope with the influence of the external environment on the recognition result,image quality and sound quality assessment methods were introduced.By evaluating the quality of information,features with poor information quality were removed.Information quality dynamically adjusted the weight proportion of the module,and rejected individuals with low matching degree of single-mode feature recognition.Then,according to DS theory,each evidence was merged into a new body of evidence to realize user identification.The experimental results show that the fusion method which takes into account the characteristic signal quality can effectively improve the recognition accuracy and security.…”
    Get full text
    Article
  18. 5558

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    “…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
    Get full text
    Article
  19. 5559

    Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN

    Published 2015-02-01
    “…An anonymous cluster head election protocol in clustered wireless sensor networks was proposed.The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilinear pairings was adopted to verify election results,ensuring the successful election of cluster heads.A corresponding anonymous data aggregation scheme was designed,through which data aggregation can be accomplished without revealing the identities of aggregators.Extensive analysis and simulation results show that the proposed protocol achieves anonymity,energy efficiency and security of cluster heads election simultaneously and can resist eavesdropping attacks,node compromise attacks and collusion attacks effectively.…”
    Get full text
    Article
  20. 5560

    Incentive mechanism enables efficient fog network by Beibei WANG, Fei SHEN, Xujie LI, Huihui XU, Chongchong ZHANG

    Published 2019-03-01
    “…In order to improve the resource utilization and service quality of the fog network,as well as ensure the reliability and security of heterogeneous fog nodes,a reasonable incentive mechanism was required.The introduction of incentive mechanism can effectively motivate the service enthusiasm of fog network equipment and reduce the malicious or selfish behavior of the equipment.Firstly,the research significance of the fog computing was proposed,and the characteristics as well as the application scenarios of fog networks were given.Secondly,the system architecture of the fog network was introduced.Then the incentive mechanism was integrated with the resource sensing technology and the task offloading technology in the fog network,and further examples were presented to show the important role of the incentive mechanism in the fog network.…”
    Get full text
    Article