Showing 801 - 820 results of 9,720 for search '"security"', query time: 0.06s Refine Results
  1. 801
  2. 802

    Fast anomalous traffic detection system for secure vehicular communications by Qasem Abu Al-Haija, Abdulaziz A. Alsulami

    Published 2024-12-01
    “…Despite its ubiquitous use, the CAN protocol lacks critical security features, making vehicle communications vulnerable to message injection attacks. …”
    Get full text
    Article
  3. 803
  4. 804

    A Resilience-Based Security Assessment Approach for CBTC Systems by Ruiming Lu, Huiyu Dong, Hongwei Wang, Dongliang Cui, Li Zhu, Xi Wang

    Published 2021-01-01
    “…The CBTC system ensures safe and efficient operation of trains, so the quantitative assessment of cyber security is quite necessary. In this paper, a resilience-based assessment method is proposed to analyze the security level of CBTC systems based on indicators of both the cyber domain and the physical domain. …”
    Get full text
    Article
  5. 805
  6. 806
  7. 807

    An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment by Sudha Devi Dorairaj, Thilagavathy Kaliannan

    Published 2015-01-01
    “…Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. …”
    Get full text
    Article
  8. 808
  9. 809

    Secure network coding method merged with timestamp and homomorphic signature by Heng-li PEI, Tao SHANG, Jian-wei LIU

    Published 2013-04-01
    “…A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed.The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of net it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature.The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding a security of the proposed scheme.Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously,and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.…”
    Get full text
    Article
  10. 810

    Shaping the future of commercial quantum computer and the challenge for information security by Chao WANG, Yun-jiang WANG, Feng HU

    Published 2016-03-01
    “…The modern cryptography still has strong security. Take the quantum devices constraints into consideration was proposed for the first time, the storage of former registers in the Shor algorithm should be 100 or less Qubits theoretically decreased from 1 000 or more Qubits. …”
    Get full text
    Article
  11. 811
  12. 812
  13. 813

    Verification of serialising instructions for security against transient execution attacks by Kushal K. Ponugoti, Sudarshan K. Srinivasan, Nimish Mathure

    Published 2023-07-01
    “…However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. …”
    Get full text
    Article
  14. 814

    Research on bionic mechanism based endogenous security defense system by Aiqun HU, Lanting FANG, Tao LI

    Published 2021-02-01
    Subjects: “…endogenous security…”
    Get full text
    Article
  15. 815
  16. 816

    Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks by Tung-Shih Su, Mei-Wen Huang, Wei-Shou Li, Wen-Shyong Hsieh

    Published 2012-07-01
    “…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. The sink node is the only certification authority in our system, but n level cluster heads can be extended to n level certification authorities if needed, where n is maximum number of level.…”
    Get full text
    Article
  17. 817
  18. 818
  19. 819
  20. 820

    Enhancing Security in International Data Spaces: A STRIDE Framework Approach by Nikola Gavric, Andrii Shalaginov, Aliaksei Andrushevich, Andreas Rumsch, Andrew Paice

    Published 2024-12-01
    “…Regulatory and technological frameworks such as International Data Spaces (IDS) have been developed to facilitate secure data exchange while integrating security and data sovereignty aspects required by laws and regulations, such as the GDPR and NIS2. …”
    Get full text
    Article