Showing 861 - 880 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 861
  2. 862
  3. 863

    BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks by Ning Yu, Lirui Zhang, Yongji Ren

    Published 2013-03-01
    “…Localization is the key supporting technology for wireless sensor networks (WSNs). Security and accuracy are the premise of the localization application. …”
    Get full text
    Article
  4. 864
  5. 865
  6. 866

    UCAP:a PCL secure user authentication protocol in cloud computing by Xuefeng LI, Junwei ZHANG, Jianfeng MA

    Published 2018-08-01
    “…As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.…”
    Get full text
    Article
  7. 867
  8. 868
  9. 869

    Cyber Security Intrusion Detection Using a Deep Learning Method by Basheer Ullah, Shafiq-ur-Rehman Massan, M. Abdul Rehman, Rabia Ali Khan

    Published 2025-01-01
    “…The World is moving towards information technology dependence, the cornerstone of which is information security. As the number of active connections becomes large so is the need of security increasing day by day. …”
    Get full text
    Article
  10. 870
  11. 871
  12. 872

    Verifiable three-party secure key exchange protocol based on eigenvalue by Yanshuo ZHANG, Zehao WANG, Zhiqiang WANG, Huiyan CHEN

    Published 2019-12-01
    “…In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However,the validity of key exchange cannot be verified by the scheme,and counterfeiting by middlemen can’t be prevented.Then based on it,the secret matrix was reconstructed,where the matrix order was a large even number,and all the eigenvalues appeared in pairs,similar to the diagonal matrix.Based on the special secret matrix,the verification part which can be used to verify the legitimacy of the communication party was introduced to the scheme,and the verifiable three-party key exchange protocol based on the eigenvalue was given.The protocol not only solved the problem of three-party key exchange,but also verified identity legitimacy.It is proved that it’s feasible to design a three-party key exchange protocol by the eigenvalue.The final protocol is both secure and efficient.…”
    Get full text
    Article
  13. 873
  14. 874
  15. 875
  16. 876

    Factors influencing food security among fishermen households in West Java by Irbah Syahputri Rofifah, Tanziha Ikeu, Farida Baliwati Yayuk, Retna Puspita Dyah

    Published 2025-01-01
    “…Background: Food security is a critical component of sustainable development, particularly concerning health and nutrition. …”
    Get full text
    Article
  17. 877
  18. 878
  19. 879
  20. 880