Showing 1,101 - 1,120 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 1101
  2. 1102

    A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization by Su-Wan Park, JaeDeok Lim, Jeong Nyeo Kim

    Published 2015-02-01
    “…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. …”
    Get full text
    Article
  3. 1103
  4. 1104
  5. 1105

    Secure password-based authentication scheme with anonymous identity without smart cards by WANG Bang-ju1, ZHANG Huan-guo1, WANG Yu-hua3

    Published 2008-01-01
    “…Rhee-Kwon-Lee’s password-based scheme without using smart cards is vulnerable to insider attack,password can’t be changed freely,and its computational cost is high.In order to fix all these security flaws,a new password-based authentication scheme with anonymous identity without using smart cards was presented.The security and computational efficiency of our scheme were improved by confusing the anonymous identity with user’s password and taking use of the timestamp.According to comparisons with other password authentication schemes without smart cards,our scheme not only fixes weaknesses of Rhee-Kwon-Lee’s scheme,but also satisfies all the security requirements for ideal password authentication without smart cards and is the better one in security performance and computational cost.…”
    Get full text
    Article
  6. 1106

    Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO

    Published 2017-05-01
    “…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
    Get full text
    Article
  7. 1107
  8. 1108
  9. 1109
  10. 1110

    An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers by Mauricio Zapateiro De la Hoz, Leonardo Acho, Yolanda Vidal

    Published 2015-01-01
    “…Security and secrecy are some of the important concerns in the communications world. …”
    Get full text
    Article
  11. 1111

    A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges by Donagani Ramakrishna, Mohammed Ali Shaik

    Published 2025-01-01
    “…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. …”
    Get full text
    Article
  12. 1112
  13. 1113
  14. 1114
  15. 1115
  16. 1116
  17. 1117
  18. 1118
  19. 1119
  20. 1120