On August 2,Zhuhai,a city in south China’s Guangdong Province, issued road safety regulations banning begging in vehicle lanes. The new regulations allow the police to impose fines on beggers.Drivers who buy anything...On August 2,Zhuhai,a city in south China’s Guangdong Province, issued road safety regulations banning begging in vehicle lanes. The new regulations allow the police to impose fines on beggers.Drivers who buy anything from vendors or give money to beg- gars will also be fined.展开更多
1Banff移植病理学会议的起源及其简要历程Banff移植病理学会议(Banff Conference on Allograft Pathology,简称“Banff会议”)创立于1991年,截止至2021年,已经走过了30年的历程^([1-5])。Banff会议及其移植病理学诊断标准的建立和不断更...1Banff移植病理学会议的起源及其简要历程Banff移植病理学会议(Banff Conference on Allograft Pathology,简称“Banff会议”)创立于1991年,截止至2021年,已经走过了30年的历程^([1-5])。Banff会议及其移植病理学诊断标准的建立和不断更新,是国际移植病理学发展中的里程碑,不仅极大地提高了器官移植术后并发症的诊断及其治疗水平,而且也形成了一个新的学科即移植病理学。展开更多
Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured...Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement.The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services.It has improved the real-time monitoring of patients by medical practitioners.Patients’data get stored at the central server on the cloud from where it is available to medical practitioners in no time.The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’privacy.In recent days,several schemes have been proposed to ensure the safety of patients’data.But most of the techniques still lack the practical implementation and safety of data.In this paper,a secure multi-factor authentication protocol using a hash function has been proposed.BAN(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information.Security Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for simulation.The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification.Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency.展开更多
由于采用无线通信,基于无人机应用易受安全攻击。与蜂窝基站建立信任是增强无人机网络抵御安全攻击的有效措施。由于无人机的资源受限,传统的信任机制并不适用。提出基于最优路径的可扩展安全认证协议(scalable security authentication...由于采用无线通信,基于无人机应用易受安全攻击。与蜂窝基站建立信任是增强无人机网络抵御安全攻击的有效措施。由于无人机的资源受限,传统的信任机制并不适用。提出基于最优路径的可扩展安全认证协议(scalable security authentication protocol based on optimal path,SCOP)。SCOP协议利用Christofides算法构建最优路径,基站再依据此路径传输组合的认证消息,降低认证开销。同时,SCOP引用物理不可克函数和简易加密操作,确保物理层安全,降低无人机端的计算开销。通过BAN逻辑证明了SCOP协议的正确性。性能分析表明,相比于同类的认证协议,提出的SCOP协议降低了认证开销,减少了无人机端的运算时间。展开更多
The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information...The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information,perform analysis,and even come to meaningful conclusions without human capital intervention matters.Such circumstances require stringent security measures and,in particular,the extent of authentication.Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious,wrongly authenticated device finds its way into the IoT system.This research provides a clear and updated view of the trends in the IoT authentication area.Among the issues covered include a series of authentication protocols that have remained research gaps in various studies.This study applies a comparative evaluation of authentication protocols,including their strengths and weaknesses.Thus,it forms the foundation in the IoT authentication field of study.In that direction,a multi authentication architecture that involves secured means is proposed for protocol authentication.Informal analysis can affect the security of the protocols.Burrows-Abadi-Needham(BAN)logic provides proof of the attainment of mutual authentication.NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.展开更多
文摘From early April,China’s national broad-caster CCTV banned the use of borrowed English abbreviations such as NBA,GDP,WTO and CPI in all its programs.
文摘On August 2,Zhuhai,a city in south China’s Guangdong Province, issued road safety regulations banning begging in vehicle lanes. The new regulations allow the police to impose fines on beggers.Drivers who buy anything from vendors or give money to beg- gars will also be fined.
文摘1Banff移植病理学会议的起源及其简要历程Banff移植病理学会议(Banff Conference on Allograft Pathology,简称“Banff会议”)创立于1991年,截止至2021年,已经走过了30年的历程^([1-5])。Banff会议及其移植病理学诊断标准的建立和不断更新,是国际移植病理学发展中的里程碑,不仅极大地提高了器官移植术后并发症的诊断及其治疗水平,而且也形成了一个新的学科即移植病理学。
基金Taif University Researchers Supporting Project number(TURSP-2020/98),Taif University,Taif,Saudi Arabia。
文摘Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement.The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services.It has improved the real-time monitoring of patients by medical practitioners.Patients’data get stored at the central server on the cloud from where it is available to medical practitioners in no time.The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’privacy.In recent days,several schemes have been proposed to ensure the safety of patients’data.But most of the techniques still lack the practical implementation and safety of data.In this paper,a secure multi-factor authentication protocol using a hash function has been proposed.BAN(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information.Security Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for simulation.The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification.Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency.
文摘由于采用无线通信,基于无人机应用易受安全攻击。与蜂窝基站建立信任是增强无人机网络抵御安全攻击的有效措施。由于无人机的资源受限,传统的信任机制并不适用。提出基于最优路径的可扩展安全认证协议(scalable security authentication protocol based on optimal path,SCOP)。SCOP协议利用Christofides算法构建最优路径,基站再依据此路径传输组合的认证消息,降低认证开销。同时,SCOP引用物理不可克函数和简易加密操作,确保物理层安全,降低无人机端的计算开销。通过BAN逻辑证明了SCOP协议的正确性。性能分析表明,相比于同类的认证协议,提出的SCOP协议降低了认证开销,减少了无人机端的运算时间。
文摘The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information,perform analysis,and even come to meaningful conclusions without human capital intervention matters.Such circumstances require stringent security measures and,in particular,the extent of authentication.Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious,wrongly authenticated device finds its way into the IoT system.This research provides a clear and updated view of the trends in the IoT authentication area.Among the issues covered include a series of authentication protocols that have remained research gaps in various studies.This study applies a comparative evaluation of authentication protocols,including their strengths and weaknesses.Thus,it forms the foundation in the IoT authentication field of study.In that direction,a multi authentication architecture that involves secured means is proposed for protocol authentication.Informal analysis can affect the security of the protocols.Burrows-Abadi-Needham(BAN)logic provides proof of the attainment of mutual authentication.NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.