Showing 1,161 - 1,180 results of 9,720 for search '"security"', query time: 0.10s Refine Results
  1. 1161
  2. 1162
  3. 1163

    Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles by Haibo ZHANG, Hongwu HUANG, Kaijian LIU, Xiaofan HE

    Published 2021-06-01
    “…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
    Get full text
    Article
  4. 1164
  5. 1165
  6. 1166
  7. 1167
  8. 1168
  9. 1169
  10. 1170
  11. 1171

    A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks by Tianyue Bao, Jiangwen Wan, Kefu Yi, Qiang Zhang

    Published 2015-09-01
    “…To address these challenges, the paper presents a novel game-based secure localization algorithm. The nodes' strategy level can be indicated through the results of trust evaluation and then by means of constructing reasonable strategy space and payoff function using game theory; all kinds of nodes within the network can achieve the optimal payoffs. …”
    Get full text
    Article
  12. 1172
  13. 1173
  14. 1174
  15. 1175

    Strategic autonomy of Russia in the changing international environment and consequences for the regional security of the Balkans by Proroković Dušan

    Published 2024-01-01
    “…The aim of the research is to analyze the realization of Russia's strategic autonomy by applying the concept of extended deterrence for the regional security of the Balkans. For this, the methods of discourse analysis (direction of Russian policy) and content analysis (individual strategic documents and statements of representative officials), case studies (Balkan regional framework) and synthesis are used. …”
    Get full text
    Article
  16. 1176
  17. 1177

    A Secure Cooperative Spectrum Sensing Scheme in Mobile Cognitive Radio Networks by Jun Du, Daoxing Guo, Bangning Zhang, Ligang Shang

    Published 2014-06-01
    “…However, in existing works, the problem of secure CSS in mobile cognitive radio networks (CRNs) has not been well considered yet. …”
    Get full text
    Article
  18. 1178
  19. 1179
  20. 1180

    Application of security threat intelligence based on big data analysis in telecom operators by Mingxia BO, Hongyu TANG, Chen MA, Jian ZHANG

    Published 2020-11-01
    “…As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to operators was introduced,the productive process of threat intelligence was analyzed in detail,and finally the typical application scenarios of threat intelligence were given,which could provide technical reference for telecom operators in the practice of threat intelligence.…”
    Get full text
    Article