Showing 1,321 - 1,340 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 1321
  2. 1322
  3. 1323

    Secure and efficient token based roaming authentication scheme for space-earth integration network by Kaiping XUE, Yongjin MA, Jia’nan HONG, Jie XU, Qingyou YANG

    Published 2018-05-01
    “…Aiming at the problem of prolongation and instability of satellite and terrestrial physical communication links in the space-earth integration network,a two-way token based roaming authentication scheme was proposed.The scheme used the characteristics of the computing capability of the satellite nodes in the network to advance the user authentication process from the network control center (NCC) to the access satellite.The satellite directly verified the token issued by the NCC to verify the user's identity.At the same time,the token mechanism based on the one-way accumulator achieved the user's dynamic join,lightweight user self-service customization and billing,and the introduction of Bloom Filter enabled effective user revocation and malicious access management.Compared with the existing scheme,the scheme can guarantee the security of roaming authentication and significantly reduce the calculation and communication overhead of the authentication and key negotiation process.…”
    Get full text
    Article
  4. 1324
  5. 1325
  6. 1326

    Femtosecond Laser‐Induced Recrystallized Nanotexturing for Identity Document Security With Physical Unclonable Functions by Panpan Niu, Jiao Geng, Qilin Jiang, Yangyundou Wang, Jianxin Sang, Zhenghong Wang, Liping Shi

    Published 2025-01-01
    “…Abstract Counterfeit identity (ID) documents pose a serious threat to personal credit and national security. As a promising candidate, optical physical unclonable functions (PUFs) offer a robust defense mechanism against counterfeits. …”
    Get full text
    Article
  7. 1327
  8. 1328
  9. 1329
  10. 1330
  11. 1331
  12. 1332

    Water management for rice production: a key component of food security in East Africa by Denis Bwire, Hirotaka Saito, Roy C. Sidle, Moses Mugisha

    Published 2025-02-01
    “…Abstract Water is a valuable resource for rice production, which is an integral component of food security in East Africa (EA). Rice farming is expanding in the region, with up to 90% produced on smallholder farms using traditional flooding and rain-fed methods, vulnerable to climate change and variability. …”
    Get full text
    Article
  13. 1333
  14. 1334

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
    Get full text
    Article
  15. 1335

    Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment by Yuan Gao, Hequn Xian, Aimin Yu

    Published 2020-03-01
    “…In order to ensure data security for deduplication, different data should be assigned with different privacy levels. …”
    Get full text
    Article
  16. 1336
  17. 1337
  18. 1338

    Concepts and types of administrative and legal means of ensuring economic security by the National Police of Ukraine by V. V. Tolochko

    Published 2018-12-01
    “…The conducted research should become the basis for studying the problems of certain administrative and legal means of ensuring economic security by the National Police of Ukraine, which is a perspective direction for further scientific research.…”
    Get full text
    Article
  19. 1339
  20. 1340