Showing 341 - 360 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 341
  2. 342
  3. 343

    Security analysis and improvement of a certificateless signcryption scheme by Zhen-guo ZHAO

    Published 2015-03-01
    “…To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography.Recently,Zhu et al.proposed a certificateless signcryption without bilinear pairings.However, their scheme was completely insecure against with two concrete attacks. A strongly secure certificateless signcryption without bilinear pairings was also proposed, which was provably secure in the random oracle model under the assumption that the discrete logarithm problem and the computational Diffie-Hellman problems were intractable. …”
    Get full text
    Article
  4. 344

    Modified security model based on dynamic trusted degree by NIE Xiao-wei1, FENG Deng-guo1

    Published 2008-01-01
    Subjects: “…security architecture…”
    Get full text
    Article
  5. 345

    Improving the information security sustainability of the economy financial sector by V. V. Kachurin, R. G. Akhmadeev

    Published 2023-06-01
    “…The study analyzes the main activities of Russia Bank, aimed at ensuring the sustainability of information security in the financial sector of the economy, as well as ongoing activities aimed at limiting the spread of cybercrime based on an automated incident handling system. …”
    Get full text
    Article
  6. 346

    Systematic literature review on Internet-of-Vehicles communication security by Manar Abu Talib, Sohail Abbas, Qassim Nasir, Mohamad Fouzi Mowakeh

    Published 2018-12-01
    “…As a result, there is an urgent need to study the possible security threats and different solutions that can ensure the safety of drivers and also the security of industry. …”
    Get full text
    Article
  7. 347
  8. 348
  9. 349
  10. 350

    Research on security architecture of strong PUF by adversarial learning by Yan LI, Wei LIU, Yuanlu SUN

    Published 2021-06-01
    “…To overcome the vulnerability of strong physical unclonable function, the adversarial learning model of strong PUF was presented based on the adversarial learning theory, then the training process of gradient descent algorithm was analyzed under the framework of the model, the potential relationship between the delay vector weight and the prediction accuracy was clarified, and an adversarial sample generation strategy was designed based on the delay vector weight.Compared with traditional strategies, the prediction accuracy of logistic regression under new strategy was reduced by 5.4% ~ 9.5%, down to 51.4%.The physical structure with low overhead was designed corresponding to the new strategy, which then strengthened by symmetrical design and complex strategy to form a new PUF architecture called ALPUF.ALPUF not only decrease the prediction accuracy of machine learning to the level of random prediction, but also resist hybrid attack and brute force attack.Compared with other PUF security structures, ALPUF has advantages in overhead and security.…”
    Get full text
    Article
  11. 351
  12. 352
  13. 353
  14. 354
  15. 355
  16. 356
  17. 357
  18. 358

    Secure and Privacy Enhanced Gait Authentication on Smart Phone by Thang Hoang, Deokjai Choi

    Published 2014-01-01
    “…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
    Get full text
    Article
  19. 359
  20. 360

    An Efficient Data Analysis Framework for Online Security Processing by Jun Li, Yanzhao Liu

    Published 2021-01-01
    “…Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. …”
    Get full text
    Article