Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1401
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
Published 2020-11-01Subjects: “…network and information security…”
Get full text
Article -
1402
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
Published 2015-09-01“…To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.…”
Get full text
Article -
1403
Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges
Published 2024-10-01Subjects: “…wireless physical layer security…”
Get full text
Article -
1404
Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism
Published 2017-02-01Subjects: Get full text
Article -
1405
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01Subjects: Get full text
Article -
1406
EdgeSecureDP: Strengthening IoHTs Differential Privacy Through Graphvariate Skellam
Published 2025-01-01“…These mechanisms treat data points independently, failing to account for the complex interconnections between nodes (drugs) and edges (interactions), leaves the network vulnerable to structural attacks that can reverse-engineer relationships, thus limiting the security of collaborative drug discovery. To address these limitations, this work proposes Graphvariate Skellam, a novel DP approach that leverages graph structure information in FL settings, referred to as EdgeSecureDP. …”
Get full text
Article -
1407
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01Subjects: “…Data security…”
Get full text
Article -
1408
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions
Published 2018-01-01“…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
Get full text
Article -
1409
IoT Security: Botnet Detection Using Self-Organizing Feature Map and Machine Learning
Published 2024-12-01“…Experimental results indicate that this approach is effective for enhancing IoT security in resource-constrained devices.…”
Get full text
Article -
1410
Security decision method for the edge of multi-layer satellite network based on reinforcement learning
Published 2022-06-01“…The simulation results show that compared with the random edge security decision and the edge security decision oriented by the signal-to-noise ratio parameter,the method proposed has a greater advantage in the delay performance, and is comparable to the optimal edge security decision performance obtained by traversal.The difference is small. …”
Get full text
Article -
1411
An Evaluation of the Security Ability of the Basic Endowment Insurance System for China’s Urban and Rural Residents
Published 2022-01-01“…To evaluate security ability, a three-level evaluation index system with a total of 19 indicators is designed. …”
Get full text
Article -
1412
THE INSTITUTIONAL SYSTEM OF THE COMMON SECURITY AND DEFENCE POLICY (CSDP) OF THE EUROPEAN UNION: STRUCTURE AND MECHANICS
Published 2016-08-01Subjects: Get full text
Article -
1413
The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers)
Published 2008-05-01“…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
Get full text
Article -
1414
Distributed key sharing based scheme for security clustering in unattended wireless sensor network
Published 2015-05-01“…For unattended wireless sensor network (UWSN),considering the collecting and efficiency and security prob-lems,a secure clustering scheme for UWSN was proposed,which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity,balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm,in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes,and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing,and more than 95% attacks are tol-erated when compromised nodes are less than 20%.…”
Get full text
Article -
1415
South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions
Published 2024-12-01Subjects: “…elections, voters, technology, mobile apps, data privacy, data security, South Africa, Electoral Commission, IEC…”
Get full text
Article -
1416
A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography
Published 2021-01-01“…Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. …”
Get full text
Article -
1417
Physical-layer security transmission method based on spatial modulation with finite alphabet inputs
Published 2015-02-01Subjects: “…wireless physical-layer security…”
Get full text
Article -
1418
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01“…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
Get full text
Article -
1419
An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era
Published 2021-01-01“…With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. …”
Get full text
Article -
1420
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
Published 2023-06-01Subjects: Get full text
Article