Showing 541 - 560 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 541

    Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme by Huixian Li, Liaojun Pang

    Published 2016-05-01
    “…The scheme proved in this model can only be called selectively secure one. However, from a security perspective, the adaptively secure CP-ABPRE scheme is more desirable. …”
    Get full text
    Article
  2. 542

    Provably secure certificate less blind proxy re-signatures by Tao FENG, Yi-xin LIANG

    Published 2012-09-01
    “…Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key escrow in ID-based scheme.While achieving message privacy features of the proxy signature conversion.Based on the difficulty of NGBH and Many-NGBH problem,It proves that the new scheme can resist forgery attack characteristics.The scheme satisfies security properties:correctness and message blindness.…”
    Get full text
    Article
  3. 543
  4. 544
  5. 545
  6. 546
  7. 547
  8. 548
  9. 549
  10. 550

    Traffic planning of backbone link of quantum secure communication network by Lei YUAN, Meisheng ZHAO

    Published 2018-09-01
    Subjects: “…quantum secure communication network…”
    Get full text
    Article
  11. 551

    Discovery and research of network security vulnerabilities based on Web application by Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU

    Published 2016-06-01
    “…Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS vulnerability including type of the reflective,stored,and DOM,SQL injection vulner-ability and session authentication management vulnerability were studied.The corresponding preventive measures of the three kinds of vulnerabilities were put forward.…”
    Get full text
    Article
  12. 552
  13. 553

    ‘Bottom-up securitization’: A visual turn in security studies by M. A. Kucherov, M. V. Kharkevich

    Published 2024-03-01
    Subjects: “…international security…”
    Get full text
    Article
  14. 554
  15. 555

    Application of big data technology in enterprise information security management by Ping Li, Limin Zhang

    Published 2025-01-01
    Subjects: “…Enterprise information security…”
    Get full text
    Article
  16. 556

    A Secure Object Detection Technique for Intelligent Transportation Systems by Jueal Mia, M. Hadi Amini

    Published 2024-01-01
    “…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
    Get full text
    Article
  17. 557
  18. 558

    Security-enhanced live migration based on SGX for virtual machine by Yuan SHI, Huan-guo ZHANG, Bo ZHAO, Zhao YU

    Published 2017-09-01
    “…The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on both sides of migration,a hardware-isolated secure execution environment centered SGX was built.It guaranteed the security of operations like encryption and integrity measurement and also ensured the security of private data.An encrypted channel to transfer migration data based on the remote attestation between the secure execution environments of both migration sides was constructed.And the mutual authentication of both sides’ platform integrity was realized.Finally,the security enhancement effect and did the experiment was analyzed.The results shows that the introduction of SGX won’t cause much negative effect to the migration performance.…”
    Get full text
    Article
  19. 559
  20. 560