Showing 1,401 - 1,420 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 1401
  2. 1402

    Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership by Yue CHEN, Chao-ling LI, Ju-long LAN, Kai-chun JIN, Zhong-hui WANG

    Published 2015-09-01
    “…To solve the difficult problems of sensitive data deduplication in cloud storage,such as detection and PoW (proofs of ownership) of the duplicated ciphertext,the attacks aiming at data sensitivity,etc,a Merkle hash tree based scheme called MHT-Dedup and a homomorphic MAC based scheme called hMAC-Dedup were proposed.Both schemes provided PoW of the ciphertext file to find duplicated files on cross-user file level and check the hash of block plaintext to find duplicated blocks on local block-level,which avoided the security flaws of the hash-as-a-proof method in the cross-user file-level client-side duplication detection.MHT-Dedup provided the deterministic PoW of file with an authen-ticating binary tree generated from the tags of encrypted blocks,which had lower computing and transferring cost,and hMAC-Dedup provided the probabilistic PoW of file by verifying some sampled blocks and their homomorphic MAC tags,which had lower additional storage cost.Analyses and comparisons show that proposed schemes are preferable in many as-pects such as supporting secure two-level client-side sensitive data deduplication and resisting to brute force attack to blocks.…”
    Get full text
    Article
  3. 1403
  4. 1404
  5. 1405
  6. 1406

    EdgeSecureDP: Strengthening IoHTs Differential Privacy Through Graphvariate Skellam by Mohamed Amjath, Shagufta Henna

    Published 2025-01-01
    “…These mechanisms treat data points independently, failing to account for the complex interconnections between nodes (drugs) and edges (interactions), leaves the network vulnerable to structural attacks that can reverse-engineer relationships, thus limiting the security of collaborative drug discovery. To address these limitations, this work proposes Graphvariate Skellam, a novel DP approach that leverages graph structure information in FL settings, referred to as EdgeSecureDP. …”
    Get full text
    Article
  7. 1407
  8. 1408

    Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions by Bilal Ahmad, Wang Jian, Zain Anwar Ali

    Published 2018-01-01
    “…Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. …”
    Get full text
    Article
  9. 1409

    IoT Security: Botnet Detection Using Self-Organizing Feature Map and Machine Learning by Susanto, Deris Stiawan, Budi Santoso, Alex Onesimus Sidabutar, M. Agus Syamsul Arifin, Mohd Yazid Idris, Rahmat Budiarto

    Published 2024-12-01
    “…Experimental results indicate that this approach is effective for enhancing IoT security in resource-constrained devices.…”
    Get full text
    Article
  10. 1410

    Security decision method for the edge of multi-layer satellite network based on reinforcement learning by Peiliang ZUO, Shaolong HOU, Chao GUO, Hua JIANG, Wenbo WANG

    Published 2022-06-01
    “…The simulation results show that compared with the random edge security decision and the edge security decision oriented by the signal-to-noise ratio parameter,the method proposed has a greater advantage in the delay performance, and is comparable to the optimal edge security decision performance obtained by traversal.The difference is small. …”
    Get full text
    Article
  11. 1411

    An Evaluation of the Security Ability of the Basic Endowment Insurance System for China’s Urban and Rural Residents by Bing Liu, Yuhong He, Zhi Liu

    Published 2022-01-01
    “…To evaluate security ability, a three-level evaluation index system with a total of 19 indicators is designed. …”
    Get full text
    Article
  12. 1412
  13. 1413

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  14. 1414

    Distributed key sharing based scheme for security clustering in unattended wireless sensor network by HONGHong Z, HANGQing-yang Z, IANLi-chao T, ANGLiang-min W

    Published 2015-05-01
    “…For unattended wireless sensor network (UWSN),considering the collecting and efficiency and security prob-lems,a secure clustering scheme for UWSN was proposed,which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity,balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm,in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes,and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing,and more than 95% attacks are tol-erated when compromised nodes are less than 20%.…”
    Get full text
    Article
  15. 1415

    South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions by Nawal Omar, Scott Timcke

    Published 2024-12-01
    Subjects: “…elections, voters, technology, mobile apps, data privacy, data security, South Africa, Electoral Commission, IEC…”
    Get full text
    Article
  16. 1416

    A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography by Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye

    Published 2021-01-01
    “…Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. …”
    Get full text
    Article
  17. 1417
  18. 1418

    Pre-authentication and group management based secure handover for space-earth integration network by Jia-nan HONG, Shao-hua LI, Kai-ping XUE, Pei-lin HONG

    Published 2016-07-01
    “…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
    Get full text
    Article
  19. 1419

    An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era by Isaac Moses Kisembo, Gilbert Gilibrays Ocen, Ocident Bongomin, Andrew Egwar Alunyu, Ildephonse Nibikora, Davis Matovu, Felix Bwire

    Published 2021-01-01
    “…With several technologies shaping industry 4.0 epoch, notably, its cybersecurity entails the security of communication and network operations activities. …”
    Get full text
    Article
  20. 1420