-
521
Research on Access and Handover Authentication Mechanism of SpaceIntegrated-Ground Information Network for Multi-Type Terminals
Published 2021-09-01“…With the maturity of the key technologies of the new spectrum of the network, the network can accommodate users of various frequency bands.In order to make eff ective use of resources, diff erentiated terminals need targeted and customized security protection mechanisms.In the unifi ed network architecture, three access authentication mechanisms were proposed for common terminals, high-speed terminals and Ka terminals.At the same time, in order to ensured that diff erent types of terminals could still obtain continuous network services after accessing the network, a switching authentication mechanism based on pre-switching was proposed to provided unifi ed security switching services for the three types of terminals.Formal verifi cation tool named Scyther and informal security analysis results showed that the proposed scheme meet a variety of security requirements of the proposed scenario.At the same time, compared with the same type schemes, the proposed scheme can achieve the eff ective balance between security and performance, which can meet multidimensional integration of heaven and earth network of the scene terminal access switch and certifi cation requirements.…”
Get full text
Article -
522
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
Get full text
Article -
523
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01“…The ROR model and Scyther formal validation tool proved the security of the proposed protocol, and the informal security analysis showed that the proposed protocol was resistant to a variety of security attacks, such as physical attacks, location forgery attacks and privileged insider attacks. …”
Get full text
Article -
524
Can Sensory- and Attachment-Informed Approaches Modify the Perception of Pain? An Experimental Study
Published 2021-01-01“…Pain perceptions of individuals using either a sensory-informed (weighted modality) or an attachment-informed (secure base priming) coping strategy were compared with those of individuals using no designated coping strategy. …”
Get full text
Article -
525
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01“…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
Get full text
Article -
526
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01“…We conducted an informal security analysis of the proposed protocol and compared it with similar schemes. …”
Get full text
Article -
527
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
Get full text
Article -
528
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01“…Tested results reveal its economic affordability by attaining 243.513 ms for 500 records as an execution time. An informal security analysis has been carried out to justify the robustness of the presented framework against various attacks. …”
Get full text
Article -
529
Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children
Published 2024-11-01“…To this end, the distribution of firearm locks or storage devices in the emergency department (ED) may help achieve this target. To inform secure firearm storage programs for households with children and firearms, we examined firearm storage practices, device preferences, and cost tolerance among parents/caregivers of children. …”
Get full text
Article