Private security companies through the services they provide complement the police in crime prevention, order maintenance, and general improvement of security in societies thereby contributing to sustainable national ...Private security companies through the services they provide complement the police in crime prevention, order maintenance, and general improvement of security in societies thereby contributing to sustainable national development In order to fully benefit from their contribution and prevent them from engaging in illegal activities, states formulate and enforce policies that seek to regulate their activities. This paper examines the regulation of private guards companies in Nigeria using Abuja as its empirical core. The main aim is to promote understanding of how the private security industry is regulated and evaluate the effectiveness of the existing regulatory policy. Data for the paper were generated from in-depth interviews with the NSCDC (Nigeria Security and Civil Defence Corps), analysis of the policy for PSCs (private security companies), and a review of the annual performance report of the regulatory agency. The results revealed that the current system of PSC regulation is characterized by a lack of specialty classification of private security licences, limited regulatory scope with a focus on licensing of companies, lack of uniform standards on training, and high cost/difficulties in obtaining operational license. The paper concludes that the current regulatory setup for PSCs in Nigeria is ineffective and unsustainable and recommends an urgent review of the legal framework to alien its provisions with global standards and practices in the private security industry.展开更多
More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was s...Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeability under selective multi-ID,chosen message attack.Unfortunately,by giving concrete attacks,named " inside attack" and " outside attack" respectively,we indicate that Pang et al.'s scheme is not secure in their security model.展开更多
In order to improve efficiency of the integrated test of a launch vehicle electrical system while meeting the requirement of high-density,a cloud test platform for the electrical system was designed based on a data-dr...In order to improve efficiency of the integrated test of a launch vehicle electrical system while meeting the requirement of high-density,a cloud test platform for the electrical system was designed based on a data-driven approach,using secure private cloud technology and virtualization technology.The platform has a general hardware and software architecture,which integrates the functions of graphical editing,automated testing,data processing,fault diagnosis and so on.It can realize multi-task parallel testing.Compared with the traditional test mode,the platform has obvious advantages on testing eficiency and effectiveness.展开更多
Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the ...Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP.展开更多
In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically se...In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties展开更多
Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.Howev...Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security.展开更多
文摘Private security companies through the services they provide complement the police in crime prevention, order maintenance, and general improvement of security in societies thereby contributing to sustainable national development In order to fully benefit from their contribution and prevent them from engaging in illegal activities, states formulate and enforce policies that seek to regulate their activities. This paper examines the regulation of private guards companies in Nigeria using Abuja as its empirical core. The main aim is to promote understanding of how the private security industry is regulated and evaluate the effectiveness of the existing regulatory policy. Data for the paper were generated from in-depth interviews with the NSCDC (Nigeria Security and Civil Defence Corps), analysis of the policy for PSCs (private security companies), and a review of the annual performance report of the regulatory agency. The results revealed that the current system of PSC regulation is characterized by a lack of specialty classification of private security licences, limited regulatory scope with a focus on licensing of companies, lack of uniform standards on training, and high cost/difficulties in obtaining operational license. The paper concludes that the current regulatory setup for PSCs in Nigeria is ineffective and unsustainable and recommends an urgent review of the legal framework to alien its provisions with global standards and practices in the private security industry.
文摘More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
基金Shandong Provincial Natural Science Foundation,China(No.ZR2014FL011)Higher Educational Science and Technology Program of Shandong Province,China(No.J13LN21)
文摘Anonymity is a very important security objective in network communications.Recently,Pang et al.proposed a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeability under selective multi-ID,chosen message attack.Unfortunately,by giving concrete attacks,named " inside attack" and " outside attack" respectively,we indicate that Pang et al.'s scheme is not secure in their security model.
文摘In order to improve efficiency of the integrated test of a launch vehicle electrical system while meeting the requirement of high-density,a cloud test platform for the electrical system was designed based on a data-driven approach,using secure private cloud technology and virtualization technology.The platform has a general hardware and software architecture,which integrates the functions of graphical editing,automated testing,data processing,fault diagnosis and so on.It can realize multi-task parallel testing.Compared with the traditional test mode,the platform has obvious advantages on testing eficiency and effectiveness.
基金Supported by National Natural Science Foundation of China under Grant No.61402407
文摘Using the highly entangled six-qubit genuine state we present a quantum private comparison(QPC)protocol, which enables two users to compare the equality of two bits of their secrets in every round comparison with the assistance of a semi-honest third party(TP). The proposed protocol needs neither unitary operations nor quantum entanglement swapping technology, both of which may consume expensive quantum devices. Single particle measurements and Bell-basis measurements, which are easy to implement with current technologies, are employed by two users and TP in the proposed protocol, respectively. The proposed protocol can withstand all kinds of outside attacks and participant attacks. Moreover, none of information about the two users' private secrets and the comparison result is leaked out to TP.
文摘In most of the auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one might be interested in hiding these values. Some cryptographically secure protocols for electronic auctions have been presented in the last decade. Our work extends these protocols in several ways. On the basis of garbled circuits, i.e., encrypted circuits, we present protocols for sealed-bid auctions that fulfill the following requirements: 1) protocols are information-theoretically t-private for honest but curious parties; 2) the number of bits that can be learned by malicious adversaries is bounded by the output length of the auction; 3) the computational requirements for participating parties are very low: only random bit choices and bitwise computation of the XOR-function are necessary. Note that one can distinguish between the protocol that generates a garbled circuit for an auction and the protocol to evaluate the auction. In this paper we address both problems. We will present a t-private protocol for the construction of a garbled circuit that reaches the lower bound of 2t + 1 parties, and Finally, we address the problem of bid changes in an auction. a more randomness efficient protocol for (t + 1)^2 parties
基金supported by the National Natural Science Foundation of China (Nos. 61173170, 61300222, 61433006, and U1401258)Independent Innovation Fund of Huazhong University of Science and Technology (Nos. 2012TS052, 2012TS053, 2013QN120, and CXY13Q019)
文摘Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security.