Showing 1,241 - 1,260 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1241

    A network security situation prediction method based on hidden Markov model by Xiong ZHAN, Hao GUO, Peng ZHANG, Shu MAO

    Published 2015-12-01
    Subjects: “…network security situation prediction…”
    Get full text
    Article
  2. 1242
  3. 1243
  4. 1244

    Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme by Rui SUN, You-Liang TIAN

    Published 2016-11-01
    “…In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the cloud was proposed.Firstly,the outsourcing computing protocol was based on the fuzz matrix technology and needed not under the premise of any difficulty assumptions to ensure the security of users’ informations.Secondly,by means of generating a special kind of transformation matrixes to deal with plaintext matrix,then after the users receive the returned results,the correctness of these results can be verified effectively,and the performance analysis shows this protocol can effectively improve the efficiency of outsourcing cloud computing.Finally,an electronic trading framework for determinant outsourcing computing was proposed,which could be effectively applied to e-commerce and other fields.…”
    Get full text
    Article
  5. 1245
  6. 1246
  7. 1247
  8. 1248
  9. 1249
  10. 1250

    Research on Security Algorithm for Crossing Heterogeneous Network Based on Unified Communication Technology by Yingying Chen, Geng Zhang, Mingyue Di, Jie Li, Meilin Dang, Guilan Xing

    Published 2013-12-01
    “…Due to the unified protocol specification, encryption, and firewalls and other security measures at present, communication within the network environment are in good usability and security in heterogeneous network environment. …”
    Get full text
    Article
  11. 1251

    EBS-based efficient and secure group key management in wireless sensor networks by WANG Wei1, ZHAO Wen-hong2, LI Feng-hua3.4, MA Jian-feng3

    Published 2009-01-01
    “…To achieve the secure group communication in wireless sensor networks(WSN), a EBS-based group key management scheme was presented.First, the network topology was simplified by combining the chain-clusters and the star-clusters.Next, to prevent the adversary uncover all the administrative keys by a few colluding sensors, the number of sensors needed to capture WSN was increased.Then, the sensors of key combinations distribution were sorted through a coloring algorithm.Based on all these operations, the presented scheme distributed the administrative keys based on the hamming distance and EBS.Furthermore, the approaches handling the join event and leave event were described.Two experiments were performed to study the potential for collusions and the influence of size of compromised nodes on the effectiveness against collusions.Simulation results demonstrate that the presented scheme boosts the WSN’ resilience to attacks.The performance evaluation on join event and leave event shows that the number of key-updating messages and storage of sensors in the proposed scheme are fewer than those of SHELL.…”
    Get full text
    Article
  12. 1252
  13. 1253
  14. 1254

    CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD by DRAGOS-ALEXANDRU ANDRIOAIA

    Published 2022-10-01
    Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
    Get full text
    Article
  15. 1255
  16. 1256

    A Secure and Robust Machine Learning Model for Intrusion Detection in Internet of Vehicles by Pradeep Kumar Tiwari, Shiv Prakash, Animesh Tripathi, Tiansheng Yang, Rajkumar Singh Rathore, Manish Aggarwal, Narendra Kumar Shukla

    Published 2025-01-01
    “…Although these technologies provide unparalleled connectivity and communication capabilities, they also introduce new security challenges, particularly in terms of Intrusion Detection. …”
    Get full text
    Article
  17. 1257
  18. 1258
  19. 1259
  20. 1260