Showing 1,321 - 1,340 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1321
  2. 1322

    Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels by Xiaohong Wang, Ming Ren, Yiwei Fang, Xinji Tian, Yanyang Zeng

    Published 2022-01-01
    “…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. Finally, the theoretical results are consistent with the simulations, proving the correctness of the derivation. …”
    Get full text
    Article
  3. 1323
  4. 1324
  5. 1325
  6. 1326

    Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks by Claudio S. Malavenda, F. Menichelli, M. Olivieri

    Published 2012-01-01
    “…This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. …”
    Get full text
    Article
  7. 1327
  8. 1328

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment by Sanchika Gupta, Padam Kumar, Ajith Abraham

    Published 2013-03-01
    “…This paper identifies vulnerabilities responsible for well-known network based attacks on cloud and does a critical analysis on the security measures available in cloud environment. This paper focuses on a nonconventional technique for securing cloud network from malicious insiders and outsiders with the use of network profiling. …”
    Get full text
    Article
  9. 1329

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  10. 1330
  11. 1331
  12. 1332

    Performance analysis and power optimization for FH secure communication under frequency and phase mismatch by Changqing SONG, Hongzhi ZHAO, Lizhi QIN, Shihai SHAO

    Published 2022-09-01
    “…The artificial noise (AN) shielded frequency hopping (FH) secure communication can counteract electromagnetic interference and wiretapping, but its carrier frequencies change rapidly within a wide bandwidth which will raise the level of carrier frequency offset and phase noise, yielding AN cancellation performance degradation.To tackle this, the signal distortion caused by frequency and phase mismatch (FPM) was mathematically modeled, the AN cancellation performance was evaluated via signal-to-noise ratio, and the system secrecy was scaled via secrecy capacity.On basis of this, the optimal power allocation scheme for AN and confidential signal was designed, and the scheme was expanded according to the FPM level and the propagation channel quality.Numerical simulations verify that FPM can significantly degrade the noise cancellation performance and system secrecy, and to counteract this, the power ratio of AN to confidential signals should decrease with an increasing FPM.…”
    Get full text
    Article
  13. 1333
  14. 1334
  15. 1335

    Secure and efficient token based roaming authentication scheme for space-earth integration network by Kaiping XUE, Yongjin MA, Jia’nan HONG, Jie XU, Qingyou YANG

    Published 2018-05-01
    “…Aiming at the problem of prolongation and instability of satellite and terrestrial physical communication links in the space-earth integration network,a two-way token based roaming authentication scheme was proposed.The scheme used the characteristics of the computing capability of the satellite nodes in the network to advance the user authentication process from the network control center (NCC) to the access satellite.The satellite directly verified the token issued by the NCC to verify the user's identity.At the same time,the token mechanism based on the one-way accumulator achieved the user's dynamic join,lightweight user self-service customization and billing,and the introduction of Bloom Filter enabled effective user revocation and malicious access management.Compared with the existing scheme,the scheme can guarantee the security of roaming authentication and significantly reduce the calculation and communication overhead of the authentication and key negotiation process.…”
    Get full text
    Article
  16. 1336
  17. 1337
  18. 1338

    Femtosecond Laser‐Induced Recrystallized Nanotexturing for Identity Document Security With Physical Unclonable Functions by Panpan Niu, Jiao Geng, Qilin Jiang, Yangyundou Wang, Jianxin Sang, Zhenghong Wang, Liping Shi

    Published 2025-01-01
    “…Abstract Counterfeit identity (ID) documents pose a serious threat to personal credit and national security. As a promising candidate, optical physical unclonable functions (PUFs) offer a robust defense mechanism against counterfeits. …”
    Get full text
    Article
  19. 1339
  20. 1340