Showing 721 - 740 results of 9,720 for search '"security"', query time: 0.10s Refine Results
  1. 721

    GUC-secure protocol for private relational join operator computing by Yuan TIAN, Rong-xin SUN, Wu-yang CAI

    Published 2014-11-01
    Subjects: “…secure multiparty computation…”
    Get full text
    Article
  2. 722
  3. 723

    LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation by Yashar Salami, Vahid Khajehvand

    Published 2021-01-01
    “…Yashar et al. recently proposed a secure key exchange scheme for the fog federation. …”
    Get full text
    Article
  4. 724
  5. 725

    SDN security prediction method based on bayesian attack graph by Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG

    Published 2021-11-01
    Subjects: “…SDN security prediction…”
    Get full text
    Article
  6. 726
  7. 727
  8. 728

    Security Mechanism for Dual Stack Network Accessing of Home Gateway by Zhonghua Chen

    Published 2014-12-01
    “…Secondly, three methods were given to solve the security problems. At last, a realization and experiment result was given.…”
    Get full text
    Article
  9. 729
  10. 730
  11. 731
  12. 732

    Analysis and Improvement of Key Distribution Scheme for Secure Group Communication by Jia Ning Luo, Ming Hour Yang

    Published 2016-01-01
    “…In a secure group communication, messages between a group coordinator and members are protected by session keys. …”
    Get full text
    Article
  13. 733

    The Study of Methods for Penetration Testing in Training of Information Security Specialists by A. M. Kadan, A. K. Doronin

    Published 2016-12-01
    “…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
    Get full text
    Article
  14. 734
  15. 735
  16. 736
  17. 737

    Security against differential and linear cryptanalysis for general SPT models by Feng-mei LIU, Lian-jun CHEN, Chun-xiang LI, Yan-mei LI, Guo-shuang ZHANG

    Published 2012-01-01
    “…To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the layer for permutation.The upper bound of the maximum differentia lity was given when the branch number of P was optimal,and the upper bound of the maximum linear approximation probability and the maximum linear hull probability are given when the branch number of P was optimal and when S and T were balanced.As a consequence,the problem about evaluating the security against differential and linear cryptanalysis for general SPT models was resolved partially.…”
    Get full text
    Article
  18. 738

    Security evaluation against differential cryptanalysis for dynamic cryptographic structure by Nianping WANG, Zhicheng GUO

    Published 2021-08-01
    “…For CLEFIA cryptographic structure, a dynamic cryptographic structure was put forward.The main feature of the dynamic cryptographic structure was that the diffusion layer in the 6t(t≥1)th round could be selected arbitrarily from some linear bijection on {0,1}<sup>4</sup>.By analysing the transfer law of 6-round differential characteristic, security evaluation against differential cryptanalysis for all structures of the dynamic cryptographic structure was given.The results show that, under the condition that the round functions are all bijective, there are at least l active round functions for l-round differential characteristic when l is 6k(k≥1) or 6k+1(k≥3), and otherwise there are at least l-1 active round functions for l-round differential characteristic.…”
    Get full text
    Article
  19. 739

    Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities by Qiang Lyu, Sujuan Liu, Zhouyuan Shang

    Published 2025-01-01
    “…This integration not only enhances the security posture of smart cities but also provides a foundation for future advancements in urban cybersecurity. …”
    Get full text
    Article
  20. 740

    Research on network slicing security for 5G mMTC by Zijun XU, Jianwei LIU, Geng LI

    Published 2022-02-01
    “…With the emergence of new 5G business, architecture and technology, more and more researchers pay attention to security issues and potential security risks.Massive machine type communication is one of the three major application scenarios of 5G.It provides high performance such as large connection and low power consumption.Due to factors such as limited resources of MTC equipment, it may also weaken the security of 5G networks.At the same time, different scenarios and applications have obvious demands for network performance, service quality and security level.The flexibility of 5G networking is realized by network slicing technology.It meets the diversity and customization of 5G network services, but also brings new security threats.5G commercial rapid development.The number of IoT devices has increased exponentially.In order to ensure that 5G networks provide more efficient and safe on-demand services, it is particularly important to study the security mechanism and strategy of network slicing for 5G mMTC application scenarios.Therefore, the characteristics and security requirements of 5G mMTC were analyzed.The main security threats of network slicing were listed.In view of the above security requirements and threats, the contribution and deficiency of existing security schemes around the aspects of specific network slice authentication, slice security isolation, security management and arrangement were summarized and expounded.And the future research in this field was prospected.A SM2-based secondary authentication and security isolation model for 5G mMTC network slicing was proposed.This model framework meeted the efficiency of large-scale authentication for 5G devices and users by introducing batch authentication and pre-authentication mechanisms.By hierarchical encryption of different communication data, the security isolation between 5G mMTC network slices was realized.The performance and security of the model were also analyzed.…”
    Get full text
    Article