期刊文献+
共找到237,934篇文章
< 1 2 250 >
每页显示 20 50 100
Analysis and Application of Endogenous Wireless Security Principle for Key Generation 被引量:4
1
作者 Xu Wang Liang Jin +1 位作者 Yangming Lou Xiaoming Xu 《China Communications》 SCIE CSCD 2021年第4期99-114,共16页
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda... The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory. 展开更多
关键词 endogenous wireless security one-time pad physical layer security secret keys generation
下载PDF
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles 被引量:1
2
作者 Joe Mutebi Margaret Kareyo +1 位作者 Umezuruike Chinecherem Akampurira Paul 《Journal of Computer and Communications》 2022年第8期41-63,共23页
The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security ... The goal of this manuscript is to present a research finding, based on a study conducted to identify, examine, and validate Social Media (SM) socio-technical information security factors, in line with usable-security principles. The study followed literature search techniques, as well as theoretical and empirical methods of factor validation. The strategy used in literature search includes Boolean keywords search, and citation guides, using mainly web of science databases. As guided by study objectives, 9 SM socio-technical factors were identified, verified and validated. Both theoretical and empirical validation processes were followed. Thus, a theoretical validity test was conducted on 45 Likert scale items, involving 10 subject experts. From the score ratings of the experts, Content Validity Index (CVI) was calculated to determine the degree to which the identified factors exhibit appropriate items for the construct being measured, and 7 factors attained an adequate level of validity index. However, for reliability test, 32 respondents and 45 Likert scale items were used. Whereby, Cronbach’s alpha coefficient (α-values) were generated using SPSS. Subsequently, 8 factors attained an adequate level of reliability. Overall, the validated factors include;1) usability—visibility, learnability, and satisfaction;2) education and training—help and documentation;3) SM technology development—error handling, and revocability;4) information security —security, privacy, and expressiveness. In this case, the confirmed factors would add knowledge by providing a theoretical basis for rationalizing information security requirements on SM usage. 展开更多
关键词 Social Media Usage Information security Factors Cyber security Socio-Technical Usable-security
下载PDF
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
3
作者 Adeyemi A. Adekoya Aurelia M. Donald +1 位作者 Somasheker Akkaladevi Akinjide A. Akinola 《Journal of Information Security》 2020年第4期177-188,共12页
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ... The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated. 展开更多
关键词 Benchmark CYBERsecurity Descriptive Model Survey results Certifications Common-Body-of-Knowledge Empirical Evidence principles of Information/Cybersecurity Course Tools Deployed
下载PDF
A simplified approach to the basic principle of security measures onboard ships
4
《交通建设与管理》 2004年第5期22-24,共3页
There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one... There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one ofthe greatest threats to ships and 展开更多
关键词 A simplified approach to the basic principle of security measures onboard ships
下载PDF
Principles of Network Security Protocols Based on Dynamic Address Space Randomization 被引量:1
5
作者 Vladimir Krylov Kirill Kravtsov 《通讯和计算机(中英文版)》 2016年第2期77-89,共13页
关键词 网络安全协议 地址空间 随机化 网络安全解决方案 原理 软件解决方案 网络节点 网络地址
下载PDF
Design Principles and Mechanistic Understandings of Non-Noble-Metal Bifunctional Electrocatalysts for Zinc-Air Batteries 被引量:2
6
作者 Yunnan Gao Ling Liu +10 位作者 Yi Jiang Dexin Yu Xiaomei Zheng Jiayi Wang Jingwei Liu Dan Luo Yongguang Zhang Zhenjia Shi Xin Wang Ya‑Ping Deng Zhongwei Chen 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第9期13-48,共36页
Zinc-air batteries(ZABs)are promising energy storage systems because of high theoretical energy density,safety,low cost,and abundance of zinc.However,the slow multi-step reaction of oxygen and heavy reliance on noble-... Zinc-air batteries(ZABs)are promising energy storage systems because of high theoretical energy density,safety,low cost,and abundance of zinc.However,the slow multi-step reaction of oxygen and heavy reliance on noble-metal catalysts hinder the practical applications of ZABs.Therefore,feasible and advanced non-noble-metal elec-trocatalysts for air cathodes need to be identified to promote the oxygen catalytic reaction.In this review,we initially introduced the advancement of ZABs in the past two decades and provided an overview of key developments in this field.Then,we discussed the work-ing mechanism and the design of bifunctional electrocatalysts from the perspective of morphology design,crystal structure tuning,interface strategy,and atomic engineering.We also included theoretical studies,machine learning,and advanced characterization technologies to provide a comprehensive understanding of the structure-performance relationship of electrocatalysts and the reaction pathways of the oxygen redox reactions.Finally,we discussed the challenges and prospects related to designing advanced non-noble-metal bifunctional electrocatalysts for ZABs. 展开更多
关键词 Zinc-air batteries Bifunctional electrocatalysts Design principles Mechanistic understandings
下载PDF
Repositioning fertilizer manufacturing subsidies for improving food security and reducing greenhouse gas emissions in China 被引量:1
7
作者 Zongyi Wu Xiaolong Feng +1 位作者 Yumei Zhang Shenggen Fan 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期430-443,共14页
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ... China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies. 展开更多
关键词 food security fertilizer manufacturing subsidies agri-food systems greenhouse gas emissions
下载PDF
Adaptive Optimal Discrete-Time Output-Feedback Using an Internal Model Principle and Adaptive Dynamic Programming 被引量:1
8
作者 Zhongyang Wang Youqing Wang Zdzisław Kowalczuk 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期131-140,共10页
In order to address the output feedback issue for linear discrete-time systems, this work suggests a brand-new adaptive dynamic programming(ADP) technique based on the internal model principle(IMP). The proposed metho... In order to address the output feedback issue for linear discrete-time systems, this work suggests a brand-new adaptive dynamic programming(ADP) technique based on the internal model principle(IMP). The proposed method, termed as IMP-ADP, does not require complete state feedback-merely the measurement of input and output data. More specifically, based on the IMP, the output control problem can first be converted into a stabilization problem. We then design an observer to reproduce the full state of the system by measuring the inputs and outputs. Moreover, this technique includes both a policy iteration algorithm and a value iteration algorithm to determine the optimal feedback gain without using a dynamic system model. It is important that with this concept one does not need to solve the regulator equation. Finally, this control method was tested on an inverter system of grid-connected LCLs to demonstrate that the proposed method provides the desired performance in terms of both tracking and disturbance rejection. 展开更多
关键词 Adaptive dynamic programming(ADP) internal model principle(IMP) output feedback problem policy iteration(PI) value iteration(VI)
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
9
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing Cloud Networks Artificial Intelligence Machine Learning Cloud security
下载PDF
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
10
作者 Heejae Park Tri-HaiNguyen Laihyuk Park 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期13-41,共29页
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece... The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security. 展开更多
关键词 O-RAN ARCHITECTURE use cases security issues security requirements security discussions
下载PDF
Survey on Video Security:Examining Threats,Challenges,and Future Trends
11
作者 Ali Asghar Amna Shifa Mamoona Naveed Asghar 《Computers, Materials & Continua》 SCIE EI 2024年第9期3591-3635,共45页
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s... Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world. 展开更多
关键词 ATTACKS threats security services video manipulation video security
下载PDF
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
12
作者 Wajdi Alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Anisotropic etching mechanisms of 4H-SiC:Experimental and first-principles insights
13
作者 Guang Yang Lingbo Xu +3 位作者 Can Cui Xiaodong Pi Deren Yang Rong Wang 《Journal of Semiconductors》 EI CAS CSCD 2024年第1期42-47,共6页
Molten-alkali etching has been widely used to reveal dislocations in 4H silicon carbide(4H-SiC),which has promoted the identification and statistics of dislocation density in 4H-SiC single crystals.However,the etching... Molten-alkali etching has been widely used to reveal dislocations in 4H silicon carbide(4H-SiC),which has promoted the identification and statistics of dislocation density in 4H-SiC single crystals.However,the etching mechanism of 4H-SiC is limited misunderstood.In this letter,we reveal the anisotropic etching mechanism of the Si face and C face of 4H-SiC by combining molten-KOH etching,X-ray photoelectron spectroscopy(XPS)and first-principles investigations.The activation energies for the molten-KOH etching of the C face and Si face of 4H-SiC are calculated to be 25.09 and 35.75 kcal/mol,respectively.The molten-KOH etching rate of the C face is higher than the Si face.Combining XPS analysis and first-principles calculations,we find that the molten-KOH etching of 4H-SiC is proceeded by the cycling of the oxidation of 4H-SiC by the dissolved oxygen and the removal of oxides by molten KOH.The faster etching rate of the C face is caused by the fact that the oxides on the C face are unstable,and easier to be removed with molten alkali,rather than the C face being easier to be oxidized. 展开更多
关键词 principleS ALKALI ETCHING
下载PDF
Scientific principles for accelerating the Sustainable Development Goals
14
作者 Bojie Fu Xutong Wu +1 位作者 Shuai Wang Wenwu Zhao 《Geography and Sustainability》 CSCD 2024年第2期157-159,共3页
The Sustainable Development Goals(SDGs)are significantly off-course as we reach the midpoint of their 2030 deadline.From a scientific perspective,the critical challenge in achieving the SDGs lies in the need for more ... The Sustainable Development Goals(SDGs)are significantly off-course as we reach the midpoint of their 2030 deadline.From a scientific perspective,the critical challenge in achieving the SDGs lies in the need for more scientific principles to understand the complex socio-ecological systems(SES)and their interactions influencing the 17 SDGs.Here,we propose a scientific framework to clarify the common scientific principles and the rational treatment of diversity under these principles.The framework’s core is revealing the complex mechanisms underlying the achievement of each Sustainable Development Goal(SDG)and SDG interactions.Building upon the identified mechanisms,complex SES models can be established,and the implementation of SDGs can be formulated as a multi-objective optimization problem,seeking a compromise in competition between essential costs and desired benefits.Our framework can assist countries,and even the world in accelerating progress towards the SDGs. 展开更多
关键词 principleS SUSTAINABLE RATIONAL
下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
15
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
Strong invariance principle for a counterbalanced random walk
16
作者 TAN Hui-qun HU Zhi-shui DONG Liang 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2024年第2期370-380,共11页
We study a counterbalanced random walkS_(n)=X_(1)+…+X_(n),which is a discrete time non-Markovian process andX_(n) are given recursively as follows.For n≥2,X_(n) is a new independent sample from some fixed law̸=0 wit... We study a counterbalanced random walkS_(n)=X_(1)+…+X_(n),which is a discrete time non-Markovian process andX_(n) are given recursively as follows.For n≥2,X_(n) is a new independent sample from some fixed law̸=0 with a fixed probability p,andX_(n)=−X_(v(n))with probability 1−p,where v(n)is a uniform random variable on{1;…;n−1}.We apply martingale method to obtain a strong invariance principle forS_(n). 展开更多
关键词 random walk MARTINGALE invariance principle
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
17
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information security Cloud Infrastructure Offerings Cloud Migration security Measures Data Breaches Cloud Service Providers CYBERsecurity Cloud security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud security Tools
下载PDF
The Role of Plantain in Promoting Food Security: A Review
18
作者 Doreen Dedo Adi 《Food and Nutrition Sciences》 CAS 2024年第5期313-335,共23页
Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of ... Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste. 展开更多
关键词 Food security PLANTAIN Foam-Mat Drying RIPENING
下载PDF
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
19
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 Artificial Intelligence Cyber security QR Codes Quishing AI Framework Machine Learning AI-Enhanced security
下载PDF
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
20
作者 Fauziyah Zhaoshun Wang Mujahid Tabassum 《Computers, Materials & Continua》 SCIE EI 2024年第3期4417-4452,共36页
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method... In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security. 展开更多
关键词 CRYPTOGRAPHIC security privacy preservation DECRYPTION INTEGRITY
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部