BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufactur...BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufacturing of these two new large reusable launching vehicle models is a response to growing demand in the commercial space market,said the China Aerospace Science and Technology Corporation.展开更多
The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introdu...The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced.However,some progressive analysts point out that present security solutions are usually very difficult for several users,and they have expressed a willingness to simplify the security product user experience.Usable security is still mostly unexplored territory in computer science.Which we are all aware with security and usability on many levels,usable security has received little operational attention.Companies have recently focused primarily on usable security.As consumers prefer to discard unsatisfactory solutions,attaining well-balanced degrees of both is a prerequisite for adequate security.Usability should be examined from the viewpoint of security to be properly assessed.The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites.An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology,and the experts and academicians opinion were collected.The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.展开更多
The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security ...The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage.展开更多
With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification o...With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures.展开更多
文摘BEIJING,March 12(Xinhua)——China′s development of both 4⁃meter⁃diameter and 5⁃meter⁃diameter reusable rockets is being accelerated,with their inaugural flights scheduled for 2025 and 2026,respectively.The manufacturing of these two new large reusable launching vehicle models is a response to growing demand in the commercial space market,said the China Aerospace Science and Technology Corporation.
基金Funding for this study was received from the Deanship of Scientific Research(DSR)at King Abdulaziz University,Jeddah,Kingdom of Saudi Arabia under the Grant No.G:095-611-14422.
文摘The apparent contradiction between usability and security has been discussed in the literature for several years.This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced.However,some progressive analysts point out that present security solutions are usually very difficult for several users,and they have expressed a willingness to simplify the security product user experience.Usable security is still mostly unexplored territory in computer science.Which we are all aware with security and usability on many levels,usable security has received little operational attention.Companies have recently focused primarily on usable security.As consumers prefer to discard unsatisfactory solutions,attaining well-balanced degrees of both is a prerequisite for adequate security.Usability should be examined from the viewpoint of security to be properly assessed.The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites.An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology,and the experts and academicians opinion were collected.The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.
文摘The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage.
基金supported by Support Plan of Scientific and Technological Innovation Team in Universities of Henan Province(20IRTSTHN013)Shaanxi Key Laboratory of Information Communication Network and Security,Xi’an University of Posts&Telecommunications,Xi’an,Shaanxi 710121,China(ICNS202006)The National Natural Science Fund(No.61802117).
文摘With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures.