Showing 1,121 - 1,140 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 1121
  2. 1122

    Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher by Zezhou HOU, Jiongjiong REN, Shaozhen CHEN

    Published 2023-04-01
    “…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
    Get full text
    Article
  3. 1123
  4. 1124
  5. 1125

    TURKEY’S SEARCH FOR SECURITY AND THE SOVIET FACTOR DURİNG THE SECOND WORLD W AR by Şaban Çalış

    Published 2014-05-01
    Subjects: “…turkey’s search ;for security ; the soviet factor duri̇ng the second world w ar…”
    Get full text
    Article
  6. 1126
  7. 1127
  8. 1128

    DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks by Claudio M. de Farias, Luci Pirmez, Luiz F. R. C. Carmo, Davidson Boccardo, Flávia C. Delicato, Igor L. dos Santos, Renato Pinheiro, Rafael O. Costa

    Published 2015-11-01
    “…In this work we propose a Dynamic Security System to be applied in the shared sensor network context. …”
    Get full text
    Article
  9. 1129
  10. 1130
  11. 1131

    Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks by Liming Zhou, Yingzi Shan, Lu Chen

    Published 2018-01-01
    “…To deal with this problem, we propose a secure and efficient scheme for cluster-based query processing in wireless sensor networks. …”
    Get full text
    Article
  12. 1132
  13. 1133

    Instruction and demonstration-based secure service attribute generation mechanism for textual data by LI Chenhao, WANG Na, LIU Aodi

    Published 2024-12-01
    “…Attribute-based access control is fundamentally dependent on the secure service attribute calibration of object sources. …”
    Get full text
    Article
  14. 1134

    Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches by Mahmood Al-Bahri, Wasin Alkishri, Falah Y. H. Ahmed, Marwan Alshar'e, Sanad Al Maskari

    Published 2024-03-01
    “…Furthermore, this study presents a security model that aims to strengthen the resolution system based on data transmission security. …”
    Get full text
    Article
  15. 1135
  16. 1136
  17. 1137
  18. 1138
  19. 1139
  20. 1140

    Secure deduplication and integrity audit system based on convergent encryption for cloud storage by Xiao-yong GUO, An-min FU, Bo-yu KUANG, Wei-jia DING

    Published 2017-11-01
    “…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
    Get full text
    Article