Showing 1,101 - 1,120 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1101

    Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks by HyungJun Kim

    Published 2012-11-01
    “…An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from corporate IT, in addition to excellent management practices in managing IP-based networks. …”
    Get full text
    Article
  2. 1102
  3. 1103

    A secure message-passing framework for inter-vehicular communication using blockchain by Muhammd Awais Hassan, Ume Habiba, Usman Ghani, Muhmmad Shoaib

    Published 2019-02-01
    “…To address the issues, we proposed a secure distributed message-passing framework that does not require a centralized server, and it rates the credibility of message source using blockchain technology. …”
    Get full text
    Article
  4. 1104
  5. 1105
  6. 1106
  7. 1107
  8. 1108
  9. 1109
  10. 1110
  11. 1111
  12. 1112
  13. 1113
  14. 1114

    A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization by Su-Wan Park, JaeDeok Lim, Jeong Nyeo Kim

    Published 2015-02-01
    “…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. …”
    Get full text
    Article
  15. 1115
  16. 1116
  17. 1117

    Secure password-based authentication scheme with anonymous identity without smart cards by WANG Bang-ju1, ZHANG Huan-guo1, WANG Yu-hua3

    Published 2008-01-01
    “…Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with anonymous identity without using smart cards was presented.The security and computational efficiency of our scheme were improved by confusing the anonymous identity with user’s password and taking use of the timestamp.According to comparisons with other password authentication schemes without smart cards,our scheme not only fixes weaknesses of Rhee-Kwon-Lee’s scheme,but also satisfies all the security requirements for ideal password authentication without smart cards and is the better one in security performance and computational cost.…”
    Get full text
    Article
  18. 1118

    Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO

    Published 2017-05-01
    “…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
    Get full text
    Article
  19. 1119
  20. 1120