Showing 421 - 440 results of 529 for search '"information security"', query time: 0.07s Refine Results
  1. 421
  2. 422

    ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION by M. R. Safiullin, A. A. Abdukaeva, L. A. Elshin

    Published 2020-02-01
    “…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
    Get full text
    Article
  3. 423
  4. 424

    Efficient and fully simulated oblivious transfer protocol on elliptic curve by Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI

    Published 2023-02-01
    “…Oblivious transfer protocol, an important technology in secure multi-party computation, is the research hotspot on network and information security.Based on the bilinear pairs and the difficult problems on elliptic curves, an efficient 1-out-of-N oblivious transfer protocol in the semi-honest model and in the standard malicious model were proposed respectively.The protocol in semi-honest model was designed.It only needed two rounds of interaction.The receiver needed two times of bilinear pair arithmetic and one time of multi point arithmetic, and the sender needed n times of multi point arithmetic and n times of modular exponentiation.The security of the protocol was based on the discrete logarithm problem on elliptic curves.A zero-knowledge proof protocol and the oblivious transfer protocol in the standard malicious model were proposed respectively.The oblivious transfer protocol only needed four rounds of interaction.The receiver needed three times of bilinear pair arithmetic and three times of multi point arithmetic, and the sender needed n+1 times of multi point arithmetic and n+1 times of modular exponentiation.Besides, it can resist malicious behaviors of the party.The results show that the average running time of the protocol in the semi-honest model and in the standard malicious model were 0.787 9 s and 1.205 6 s respectively, which can further demonstrate the efficiency of the protocol.…”
    Get full text
    Article
  5. 425

    Formation of the concept of holistic management of assets and value of organizations in conditions of economic instability by Glukhov Vladimir, Pupentsova Svetlana

    Published 2024-12-01
    “…The new reality requires the realization that there is nothing permanent in the surrounding world, which forces to apply completely new approaches to corporate governance, information security, strengthening competitive positions and attracting investments. …”
    Get full text
    Article
  6. 426

    Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations by Xinsheng Li, Zhilong Xie, Jiang Wu, Taiyong Li

    Published 2019-01-01
    “…And hence how to enhance the security of images has become a hot topic in the field of information security. However, due to some intrinsic characteristics of images, image security is still a challenging task. …”
    Get full text
    Article
  7. 427

    Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture by Xiaoying Huang, Zhichuan Guo, Mangu Song, Xuewen Zeng

    Published 2021-11-01
    “…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
    Get full text
    Article
  8. 428

    A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications by L. Anusree, M. Abdul Rahiman

    Published 2022-01-01
    “…New methods and apparatuses for information security have evolved as a result of the rapid expansion of optical information processing. …”
    Get full text
    Article
  9. 429
  10. 430

    Contextual access control based on attribute-based encryption with hidden lattice structure for removable storage media by Bo CHEN, Ling YU, Xiao-hui QIANG, Yan WANG

    Published 2014-04-01
    “…It also can be applied to information security management in other ubiquitous environments.…”
    Get full text
    Article
  11. 431

    High-performance directional fuzzing scheme based on deep reinforcement learning by Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU

    Published 2023-04-01
    “…With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.…”
    Get full text
    Article
  12. 432

    Evolution of Biotechnology and Information Technology and Its Impact on Human Security by E. S. Zinovieva, Y. I. Vojtenko

    Published 2015-10-01
    “…The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. …”
    Get full text
    Article
  13. 433

    IMPACT OF ELECTRONIC RECORDS MANAGEMENT SYSTEM ON THE SECURITY OF RECORDS AMONG ADMINISTRATIVE STAFF by SUDETU OSENI, OLUWABUNMI D. BAKARE, AMINAT Z. ALLI

    Published 2023-12-01
    “…The study will be underpinned by the Information Security Model to ascertain the confidentiality, integrity and availability of the records.  …”
    Get full text
    Article
  14. 434

    Medical Image Encryption and Decryption Based on DNA: A Survey by Saja Theab Ahmed, Dalal Abdulmohsin Hammood, Raad Farhood Chisab, Nurulisma Binti Hj. Ismail

    Published 2023-09-01
    “…DNA Digital coding is the most popular form of cryptographic technology, and it is frequently employed to strengthen information security, and the most prevalent constraints of DNA cryptographic schemes feature a high degree of temporal and algor. …”
    Get full text
    Article
  15. 435

    The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia by Dwi Wina Adani, Ida Nurhayati, R. Elly Mirati

    Published 2024-11-01
    “…Therefore, enhancing security awareness to prevent phishing is crucial for both individuals and banks to protect information security and avoid becoming victims of digital crimes such as phishing.…”
    Get full text
    Article
  16. 436

    FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review by Abdulmajeed Adil Yazdeen, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, Rizgar R. Zebari

    Published 2021-03-01
    “…The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. …”
    Get full text
    Article
  17. 437

    A cross-layer approach to message authentication based on sparse representation for wireless body area networks by Ning Wang, Weiwei Li, Ting Jiang

    Published 2017-03-01
    “…Due to personal privacy, information security is a particularly important issue in wireless body area networks. …”
    Get full text
    Article
  18. 438

    Contracting account audit on social networks by Jakovljević Nemanja, Jakovljević Stefan

    Published 2022-01-01
    “…Social network account audit is an independent review of social network activities to express a professional opinion on the fulfillment of objectives, business compliance, and information security of orders on social networks. It is in principle a voluntary activity and is not subject to legal obligation like some other types of audit such as the audit of financial statements. …”
    Get full text
    Article
  19. 439

    Cybercrime and Digital Transformation by V. P. Kirilenko, G. V. Alekseev

    Published 2021-04-01
    “…Cyberspace crime is a critical threat to the information security of the state and civil society institutions. …”
    Get full text
    Article
  20. 440

    New Generation of Smart Highway: Framework and Insights by Chenglong Liu, Yuchuan Du, Yiheng Ge, Difei Wu, Cong Zhao, Yishun Li

    Published 2021-01-01
    “…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
    Get full text
    Article