security communication
Recently Published Documents


TOTAL DOCUMENTS

114
(FIVE YEARS 38)

H-INDEX

6
(FIVE YEARS 3)

2021 ◽  
Vol 2066 (1) ◽  
pp. 012058
Author(s):  
Shaojun Xiong

Abstract With the improvement of the economic level and the development of infrastructure, the use of automobiles as a mode of transportation has become more and more common, and the number of cars has continued to grow. Based on this background, the rapid development of intelligent and networked automotive network communication technology, the birth of the Internet of Vehicles technology, has promoted the transformation of the automotive industry. This article gives the corresponding security requirements based on the security risks of IoV communication, briefly introduces the basic methods to realize the security of IoV communication, and proposes the service architecture, PKI architecture and multi-PKI system mutual trust mechanism to realize the security of IoV communication based on this.


2021 ◽  
Vol 8 (2) ◽  
Author(s):  
Hillary Sang

The Government of Kenya recognizes Irish potato as one of the food security and nutrition crops together with maize and rice (GoK, 2017). This study sought to investigate the influence of radio programmes in promoting Irish potato farming as a contributor to food security in Nakuru County. The study looked at the period between 2012 and 2015 when most radio stations started programmes on agriculture. Purposive sampling method was used to identify four sub-counties in Nakuru County namely: Kuresoi South, Kuresoi North, Molo and Naivasha. A census of forty-eight farmers registered with the National Potato Council of Kenya between 2012 and 2015 were interviewed. Eleven agricultural extension officers from the sampled sub-counties were interviewed as key informants. The study established that Irish potato farmers listened and applied skills acquired from agricultural radio programmes to improve their farming leading to food security in Nakuru County. Information inaccuracy was revealed as one of the challenges during the study. Radio should, therefore, provide accurate information on specific varieties for specific regions so that Irish potato farming flourishes and nourishes Nakuru people.


Symmetry ◽  
2021 ◽  
Vol 13 (7) ◽  
pp. 1177
Author(s):  
Mu Han ◽  
Mengli Zhu ◽  
Pengzhou Cheng ◽  
Zhikun Yin ◽  
Haixin Qu

As the Internet of vehicles (IoV) is the perceptual information subject, the intelligent connected vehicle (ICV) is establishing an interconnected information transmission system through opening more external interfaces. However, security communication problems thereby are generated, attracting massive attention for researchers. Hence, the in-vehicle network system is responsible for controlling the state of the ICV and has a major impact on driving safety. In this paper, we designed an efficient secure ciphertext-policy attribute-based encryption (CP-ABE) system for protecting communication. The research focuses on mining the frequency features between vehicle nodes through the max-miner association rules algorithm, aiming to build frequent item sets. Furthermore, an improved asymmetric ABE scheme can implement secure communication in-vehicle nodes that belong to the same classification set. Through the hardware platform and in-vehicle network simulator (INVS) to evaluate our scheme, the results demonstrate that the work possesses enough security without reducing communication efficiency, meanwhile improve bus load performance.


2021 ◽  
Author(s):  
Montserrat Pérez-Martí ◽  
Lina Cristina Casadó-Marín ◽  
Abraham Guillén-Villar

BACKGROUND There are many benefits of nursing professionals being able to consult and record electronic clinical histories [ECH] at the point of care. It promotes quality and patient security, communication, continuity of care and time dedicated to records. OBJECTIVE This project evaluates the impact of having nursing records on electronic tablets at the patient’s bedside in relation to the time dedicated to the records. METHODS A before after single branch trial study was carried out in the internal medicine unit. A total of 130 observations of 2 to 3 hours duration were made. We calculated the time dedicated to measuring key patient signs, patient evaluation and ECH recording. The main variable was time spent per patient. RESULTS The analysis results for the whole sample show significant differences 0.44±0.13 min [w=-3.208, p=0.001] in the time dedicated to each patient. The findings showed a reduction in time spent on records when the tablets were used because transcription, latency time and displacements were no longer necessary. CONCLUSIONS There were different results for the different work shifts. It could have been due to multiple factors that can develop in any care situation in complex organisations like hospitals.


2021 ◽  
Vol 6 (2) ◽  
pp. 812
Author(s):  
Md Nizam Udin ◽  
Farah Azaliney Mohd Amin ◽  
Aminah Abdul Malek ◽  
Nur Annisa Zulkifili ◽  
Nur Atiqah Ghazali ◽  
...  

Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.  Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervened by attackers and criminal activists. Hence, this study suggests implementing the Elliptic Curve Cryptography to better enhance the security of the original Blom’s. In this proposed scheme, points generated from the elliptic curve will be appointed as public identifiers to be used in the original scheme. The private key and session key of each user are generated using the addition law mathematical operation with public identifiers assigned. Two users who intend to communicate with each other will obtain a common session key. Overall, the modification of Blom’s Key pre-distribution scheme will be presented in this study.


2021 ◽  
Vol 693 (1) ◽  
pp. 012001
Author(s):  
Aidong Xu ◽  
Tengyue Zhang ◽  
Liang Chen ◽  
Jie Tang ◽  
Yixin Jiang ◽  
...  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hasni Gayathma Gunasekara ◽  
Pournima Sridarran ◽  
Dilakshan Rajaratnam

Purpose Facilities management (FM) has become a revolutionary profession, which adds value to the built environment. Compared to other industries, the development of the FM industry is at a preliminary stage owing to poor adaptation of digitalisation. Although FM procurement process has improved over time, it is still complex, inefficient and challenging with the lack of digital innovations. Blockchain technology has emerged as a revolutionary digital technology under “Procurement 4.0”. The purpose of this paper is to develop a framework that enables the effective use of blockchain technology for FM procurement process. Design/methodology/approach Data collection using interviews was performed in two stages adopting a mono method qualitative methodological choice using case studies and survey strategies. Template analysis and content analysis techniques were used to analyse the collected data. Findings Through the findings, main steps in the current FM process were identified. It was revealed, manual procurement has issues related to, efficiency, data security, communication and transparency. Similarly, e-procurement systems also have issues related to data security, poor integration and transparency. FM industry has identified the requirement of transforming into an advanced digitalised technology-based procurement system. This study revealed, blockchain features to overcome these issues and the application of blockchain technology in different steps of the procurement process through the developed framework. Originality/value The developed framework offers a solution for the future technological transformation of FM procurement using blockchain technology.


Sign in / Sign up

Export Citation Format

Share Document