Showing 521 - 529 results of 529 for search '"information security"', query time: 0.07s Refine Results
  1. 521

    Research on Access and Handover Authentication Mechanism of SpaceIntegrated-Ground Information Network for Multi-Type Terminals by Jin CAO, Lilan CHEN, Ruhui MA, Hui LI, Fenghua LI

    Published 2021-09-01
    “…With the maturity of the key technologies of the new spectrum of the network, the network can accommodate users of various frequency bands.In order to make eff ective use of resources, diff erentiated terminals need targeted and customized security protection mechanisms.In the unifi ed network architecture, three access authentication mechanisms were proposed for common terminals, high-speed terminals and Ka terminals.At the same time, in order to ensured that diff erent types of terminals could still obtain continuous network services after accessing the network, a switching authentication mechanism based on pre-switching was proposed to provided unifi ed security switching services for the three types of terminals.Formal verifi cation tool named Scyther and informal security analysis results showed that the proposed scheme meet a variety of security requirements of the proposed scenario.At the same time, compared with the same type schemes, the proposed scheme can achieve the eff ective balance between security and performance, which can meet multidimensional integration of heaven and earth network of the scene terminal access switch and certifi cation requirements.…”
    Get full text
    Article
  2. 522

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
    Get full text
    Article
  3. 523

    Lightweight PUF-based anonymous authentication protocol in V2G by FAN Xinyue, LIU Jie, HE Jiahui

    Published 2024-10-01
    “…The ROR model and Scyther formal validation tool proved the security of the proposed protocol, and the informal security analysis showed that the proposed protocol was resistant to a variety of security attacks, such as physical attacks, location forgery attacks and privileged insider attacks. …”
    Get full text
    Article
  4. 524

    Can Sensory- and Attachment-Informed Approaches Modify the Perception of Pain? An Experimental Study by Pamela Joy Meredith, Nicole Emma Andrews, Jessica Thackeray, Sophie Bowen, Cory Poll, Jenny Strong

    Published 2021-01-01
    “…Pain perceptions of individuals using either a sensory-informed (weighted modality) or an attachment-informed (secure base priming) coping strategy were compared with those of individuals using no designated coping strategy. …”
    Get full text
    Article
  5. 525

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
    Get full text
    Article
  6. 526

    Smart Home Security: An Efficient Multi-Factor Authentication Protocol by Ghazaleh Sarbishaei, Amir Masoud Aminian Modarres, Farahnaz Jowshan, Fateme Zahra Khakzad, Hasti Mokhtari

    Published 2024-01-01
    “…We conducted an informal security analysis of the proposed protocol and compared it with similar schemes. …”
    Get full text
    Article
  7. 527

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
    Get full text
    Article
  8. 528

    Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO by Adla Padma, Mangayarkarasi Ramaiah

    Published 2025-03-01
    “…Tested results reveal its economic affordability by attaining 243.513 ms for 500 records as an execution time. An informal security analysis has been carried out to justify the robustness of the presented framework against various attacks. …”
    Get full text
    Article
  9. 529

    Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children by Meredith B. Haag, Catlin H. Dennis, Steven McGaughey, Tess A. Gilbert, Susan DeFrancesco, Adrienne R. Gallardo, Benjamin D. Hoffman, Kathleen F. Carlson

    Published 2024-11-01
    “…To this end, the distribution of firearm locks or storage devices in the emergency department (ED) may help achieve this target. To inform secure firearm storage programs for households with children and firearms, we examined firearm storage practices, device preferences, and cost tolerance among parents/caregivers of children. …”
    Get full text
    Article