Showing 421 - 440 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 421

    Study and implementation of integrated network security monitoring system by ZHANG Hui-min, QIAN Yi-ping, ZHENG Qing-hua, DONG Shi-jie, GUAN Xiao-hong

    Published 2003-01-01
    “…As the kernel of integrated network security and defense system, the prototype of NSMS has already been developed and tested, it is proved to be efficient, open and practical in network security monitoring.…”
    Get full text
    Article
  2. 422

    Secure federated distillation GAN for CIDS in industrial CPS by Junwei LIANG, Geng YANG, Maode MA, Sadiq Muhammad

    Published 2023-12-01
    “…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
    Get full text
    Article
  3. 423
  4. 424

    Secure and efficient two-party ECDSA signature scheme by Jing WANG, Libing WU, Min LUO, Debiao HE

    Published 2021-02-01
    “…To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad Beaver’s triple, and utilizing the Beaver’s triple based secure two-party multiplication technology, some computationally intensive homomorphic encryption operations and oblivious transfer operations with high communication overhead were effectively avoided, and thereby an efficient two-party ECDSA signing was realized, which could ensure that the two signing parties output valid ECDSA signature without reconstructing the complete private key.The proposed scheme was proved to be provably secure under the hybrid model of the universally composable framework.Theoretical analysis and simulation results demonstrate that the proposed scheme has significant advantages in terms of signing efficiency and bandwidth requirements when compared with the existing two two-party ECDSA signature schemes.…”
    Get full text
    Article
  5. 425
  6. 426
  7. 427

    Secure Multicast Routing Algorithm for Wireless Mesh Networks by Rakesh Matam, Somanath Tripathy

    Published 2016-01-01
    “…Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. …”
    Get full text
    Article
  8. 428

    Residential Property Value and Security Features in Gated Communities by J.U OSAGIE, V.U ILECHUKWU

    Published 2016-12-01
    Subjects: “…Gated community, Lagos, Nigeria, Residential property value, Security features, Willingness to pay…”
    Get full text
    Article
  9. 429

    Human resources development in farming and fisheries for food security by Abdulla Nadhiya, Vasylieva Natalia

    Published 2025-01-01
    “…The article delves into the issues of providing food security in the Maldives, a nation that regularly faces adverse weather conditions and natural disasters. …”
    Get full text
    Article
  10. 430
  11. 431
  12. 432
  13. 433
  14. 434

    A Secure and Fair Joint E-Lottery Protocol by Chin-Ling Chen, Yuan-Hao Liao, Woei-Jiunn Tsaur

    Published 2014-01-01
    “…In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. The players can check the lottery integrity, and the winning numbers can be verified publicly.…”
    Get full text
    Article
  15. 435

    Security sharing scheme for encrypted data in cloud storage by Wen-bin YAO, Si HAN, Xiao-yong LI

    Published 2015-10-01
    “…With the convenient of storing and sharing data in cloud storage environment,the concerns about data security arised as well.To achieve data security on untrusted servers,user usually stored the encrypted data on the cloud storage environment.How to build a cipertext-based access control scheme became a pot issue.For the access control problems of ciphertext in cloud storage environment,a CP-ABE based data sharing scheme was proposed.Novel key generation and distribution strategies were proposed to reduce the reliance on a trusted third party.Personal information was added in decryption key to resistant conclusion attacks at the same time.Moreover,key revocation scheme was proposed to provide the data backward secrecy.The security and implement analysis proves that proposed scheme is suit for the real application environment.…”
    Get full text
    Article
  16. 436
  17. 437
  18. 438
  19. 439
  20. 440