Showing 401 - 420 results of 529 for search '"information security"', query time: 0.06s Refine Results
  1. 401

    SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm by Junlong Shi

    Published 2023-01-01
    “…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
    Get full text
    Article
  2. 402

    Method for generating pseudo random numbers based on cellular neural network by Li-hua DONG, Guo-li YAO

    Published 2016-10-01
    “…To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.…”
    Get full text
    Article
  3. 403
  4. 404

    Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers by Yifan DING, Guangqiu LI, Hui LI

    Published 2022-03-01
    “…The combination of non-orthogonal multiple access (NOMA) and simultaneous wireless information and power transfer (SWIPT) technologies can improve spectrum efficiency of wireless system and solve the power supply problem of user nodes.However, when energy-harvesting receivers want to maliciously eavesdrop on confidential information sent by the base station, the information security transmission of SWIPT-NOMA system will be threatened.To enhance its physical layer security (PLS) performance, the PLS model of SWIPT-NOMA system with transmit antenna selection and power split strategies was proposed.When the spatial location randomly distributed energy-harvesting receivers obey the Poisson point process, the approximate expressions for the secrecy outage probability and non-zero secrecy capacity probability of SWIPT-NOMA system were derived by using the spatial Poisson probability generation function.Numerical and simulation results verify the accuracy of the expressions.The above expressions can also be used to study the influence of eavesdropper density, the distance between the base station and the far and near information receivers, the number of transmitting antennas and the power split factor on PLS performance of SWIPT-NOMA system.…”
    Get full text
    Article
  5. 405

    Security & safety issues and endogenous security for intelligent connected vehicles by JIA Hongying, LI Yufeng

    Published 2024-12-01
    “…New challenges arise in the integrated security domain, where safety, security and information security were deeply overlapped. Based on a comprehensive analysis the integrated security problem of intelligent connected vehicle (ICV) and limitations of existing security defense methods, guided by the endogenous security existence theorem, a dynamics heterogeneous redundancy (DHR) based endogenous security construction technology was proposed to solve the triple security overlap problem with integrated construction effects, achieving known and unknown threat defense without relying on prior knowledge. …”
    Get full text
    Article
  6. 406

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…It can be applied to enterprises, institutions, and departments that have higher requirements for intranet information security.…”
    Get full text
    Article
  7. 407

    Business ecosystem sustainability management by Yu. N. Kafiyatullina, E. E. Panfilova

    Published 2022-06-01
    “…The development of research in the field of sustainable development of business ecosystems is related to the consideration of information security issues for agents of the digital economy.…”
    Get full text
    Article
  8. 408
  9. 409

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…Based on the research results, the study provides recommendations for consumers, e-wallet providers, and governmental agencies to increase awareness of and responsibility for information security among the consumers who use e-wallets.…”
    Get full text
    Article
  10. 410
  11. 411

    Novel hybrid strong and weak PUF design based on FPGA by Jiana LIAN, Pengjun WANG, Gang LI, Xuejiao MA, Guanbao ZHAI

    Published 2021-04-01
    “…Physically unclonable function (PUF) can produce intrinsic keys with characteristics of randomness, uniqueness and tamper-proof by exploiting the process deviations which can not be avoided in the chip manufacturing process.A novel hybrid strong and weak PUF (SWPUF) circuit design based on field-programmable gate array(FPGA) was proposed after the investigation of the PUF circuit structures and principles.To address the limitation of designing strong-PUF and weak-PUF discretely, SWPUF could be configured into two topologies conveniently depending on the Hamming Weight (HW) of the challenges.In addition, the statistical characteristics of the responses could be further improved by a XOR-decorrelation technique.The proposed SWPUF was implemented on a Xilinx Artix-7 FPGA (28nm technology), and a self-built test platform was set up by using Matlab and MicroBlaze microcontroller.Experimental results show that the SWPUF has good performances of randomness (96.98%), uniqueness (99.64%) and reliability (96.6%).Logic register analysis also shows that the SWPUF has a better anti-attack capability than the traditional Arbiter-PUF in the case of with small HW, and can be used in the information security, such as key storage (especially to weak PUF) and device authentication (especially to strong PUF).…”
    Get full text
    Article
  12. 412
  13. 413
  14. 414

    Assessment of the effectiveness of management of innovative development institutions at the meso level by Yu. A. Abutalipova

    Published 2022-02-01
    “…It has concluded that the creation and development of a technological digital environment contribute to the effective interaction between various sectors of the economy and market entities, which is based on regulatory and legal regulation, ensuring information security, developing innovative infrastructure, providing highly qualified personnel in the industry.…”
    Get full text
    Article
  15. 415

    Information Support of Foreign Policy by O. A. Melnikova

    Published 2015-04-01
    “…Modern international relations present new challenges and threats ofcross-border nature, which fall within the area of information security. This brings issues of informational influence on international policy to the fore. …”
    Get full text
    Article
  16. 416
  17. 417
  18. 418

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Researchers believe that a comprehensive solution to the problem of ensuring the information security of minors is impossible without coordinated actions of federal and regional authorities. …”
    Get full text
    Article
  19. 419
  20. 420