-
461
Development of methodology of accounting and control processes in the digital economy
Published 2020-04-01“…A technology for the formation of information-security mission of accounting and control processes in the digital conomy and the changed requirements for the formation of information for management decisions, combining in a single information-digital “shell” accounting, control, analytical and other iterations, which should contribute to a better compilation of different reporting formats, has been presented. …”
Get full text
Article -
462
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Published 2014-01-01Get full text
Article -
463
Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT
Published 2014-01-01Get full text
Article -
464
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
Published 2025-01-01“…This engine is based on the principles of Quantum Mechanics, stochastic processes, and a new approach of decentralization for data storage focused on information security. The solution is broken down into four main components, considered four levels of security against attackers: (i) defocusing, (ii) fogging, (iii) puzzling, and (iv) crypto agility. …”
Get full text
Article -
465
Wireless Secure Communication Based on Code Domain Space-Time Modulated Metasurface
Published 2024-12-01“…While previous secure communication methods based on STMM have primarily focused on ensuring information security within both the time and frequency domains, in this study, we introduce a novel code domain modulation scheme in STMM to facilitate wireless secure communications, which is difficult to be detected in both time and frequency domains. …”
Get full text
Article -
466
-
467
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
468
Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map
Published 2021-01-01“…The results show that the proposed PRNG has good statistical output characteristics and the proposed image encryption scheme has high security, so they can be effectively applied in the field of information security and encryption system.…”
Get full text
Article -
469
Blockchain technology in healthcare strengthening: The Nigerian case
Published 2024-12-01“…Blockchain technology has many practical applications in the healthcare sector, including precision medicine and interoperability, supply chain management, authorization exchange of health information, security, and authorization, all of which are pivotal for effective health systems and quality health services. …”
Get full text
Article -
470
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01Get full text
Article -
471
Enhancing Deepfake Detection Through Quantum Transfer Learning and Class-Attention Vision Transformer Architecture
Published 2025-01-01“…The widespread use of the internet, coupled with the increasing production of digital content, has caused significant challenges in information security and manipulation. Deepfake detection has become a critical research topic in both academic and practical domains, as it involves identifying forged elements in artificially generated videos using various deep learning and artificial intelligence techniques. …”
Get full text
Article -
472
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
473
A Survey on True Random Number Generators Based on Chaos
Published 2019-01-01“…With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. …”
Get full text
Article -
474
Study of Multi-Service Networks and Communication Systems Using Distributed Network Technology in Mountain Areas
Published 2025-01-01“…It was found that the integrated performance indicators of multiservice corporate networks are largely determined by the reliability, information security and quality of service of IP / MPLS switching nodes and the IMS-Internet Protocol Multimedia Subsystem multimedia communication system using the signaling system and protocols for providing multimedia services and establishing session sessions. …”
Get full text
Article -
475
A Compact High-Gain Coplanar Waveguide-Fed Antenna for Military RADAR Applications
Published 2020-01-01Get full text
Article -
476
New image encryption algorithm based on double chaotic system and compressive sensing
Published 2022-10-01“…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
Get full text
Article -
477
Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication
Published 2020-01-01“…An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. …”
Get full text
Article -
478
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Published 2025-01-01Get full text
Article -
479
A Bibliometric Analysis of Agent-Based Systems in Cybersecurity and Broader Security Domains: Trends and Insights
Published 2025-01-01“…The top category, Computer Science Information Systems (1,424 publications), emphasizes the expanding importance of information security and artificial intelligence. Research articles are the most common document type (6,441). …”
Get full text
Article -
480
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article