security technologies
Recently Published Documents


TOTAL DOCUMENTS

396
(FIVE YEARS 120)

H-INDEX

19
(FIVE YEARS 4)

CrystEngComm ◽  
2022 ◽  
Author(s):  
Suguru Ito

Mechanoresponsive luminescent organic crystals have recently attracted increasing interest owing to their potential applications in advanced optoelectronic devices, mechanosensors, security technologies, etc. In the past few years, an increasing number...


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Qiang Yang ◽  
Daofeng Li

Digital signatures are crucial network security technologies. However, in traditional public key signature schemes, the certificate management is complicated and the schemes are vulnerable to public key replacement attacks. In order to solve the problems, in this paper, we propose a self-certified signature scheme over lattice. Using the self-certified public key, our scheme allows a user to certify the public key without an extra certificate. It can reduce the communication overhead and computational cost of the signature scheme. Moreover, the lattice helps prevent quantum computing attacks. Then, based on the small integer solution problem, our scheme is provable secure in the random oracle model. Furthermore, compared with the previous self-certified signature schemes, our scheme is more secure.


2021 ◽  
Vol 3 (2) ◽  
pp. 295-305
Author(s):  
Laksana Budiwiyono Lie ◽  
Prio Utomo ◽  
P.M. Winarno

As technology and digital applications increase in volume and complexity, organization is facing greater security risks in cyberspace more than ever before. However, organizational cybersecurity requires more than just the latest technology. All the technology available to secure systems will not keep an organization secure if the people in the organization make bad or unexpected decisions that open up the system to attackers. To secure an organization, all employees of the organization must act positively to reduce company risks from cyberattacks. All leaders have a main responsibility to understand and align with the entire organization with cybersecurity objectives. Leaders need to keep continue to invest in security technologies and also need practical solutions for dealing with the human error of cybersecurity. The conceptual paper presented in this paper describes cybersecurity culture, external influencing factors, and organizational mechanisms, the elements that contribute to each employee of the organization that having protection behaviour from cyberattacks.


Author(s):  
Dipanjan Bose ◽  
Chandan Kumar Chanda ◽  
Abhijit Chakrabarti

Abstract The resilience of the power grid is taking a vital role in the energy supply and distribution process. But due to the rapid growth of integration of renewable distributed energy sources to the traditional power grid, the nature of the trading system is shifted from the centralized to decentralized or distributed manner. Blockchain is one of the most emerging security technologies that change the dimension of the financial and energy sector with openness and complete freedom. Blockchain implemented distributed energy trading promotes decentralized electricity markets. The physical system consists of the planning of the routing of energy from one place to another. A user can not send power to another customer in any severe outage or natural disaster in a traditional system. The user cannot participate in the trade globally. So in this proposed methodology, the connections of each customer to the central grid through several microgrids have been shown. In this work, an innovative approach in trading and finding a solution to a payment method is proposed. Ethereum blockchain-based smart contracts completed the entire trading system in automation mode in our proposed system. Any power outage at one place can be compensated by routing a new path of energy inflow from another active source, which enhances the system’s resiliency to a certain degree. While trading, no third parties will be engaged so that the transaction is efficient and fast.


Author(s):  
S. P. Sokolovsky

The usage of known protection tools in information systems, including cryptographic ones, does not allow ensuring the confidentiality of information about its composition, structure and functioning algorithms, due to the fact that modern network technologies require addressable information in the service headers of the transmitted message packets. Strict dependence of information systems configurations on the quality requirements for the architecture, as well as established security policies set by regulators, causes them to have the properties of static, homogeneous and deterministic network parameters. This gives the adversary a number of indisputable advantages to non-compromising conduct network reconnaissance, high reliability of its results over a long period of time, as well as advance (planned) formation and application of the optimal set of tools to implement computer attacks. In this regard, there is a need to develop security technologies that replace static parameters of information systems with the dynamic ones. The analysis of existing technologies in the subject area under consideration showed a number of their inherent disadvantages, consisting in high resource intensity, insufficient performance and narrowness of the scope. In order to solve this problem, the author proposed a new technical solution that allows to level the disadvantages of known analogues and surpasses them by a number of criteria. The technical shape of the suite, consisting of three interconnected subsystems, that allows to mask information directions, the parameters of local area networks and manage the parameters of network connections with network reconnaissance tools, is presented and justified.


Author(s):  
Ricardo Raimundo ◽  
Albérico Travassos Rosário

Nowadays, people live amidst the smart home domain, business opportunities in the industrial smart city and health care, though, along with concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited in what comes to machine resources. In this way, traditional security does not fit in IoT systems. In this vein, the issue of cyber security has become paramount to the Internet of Things (IoT) and Industrial Internet of Things (IIoT) in mitigating cyber security risk for organizations and end users. New cyber security technologies / applications present improvements for IoT security management. Nevertheless, there is a gap on the effectiveness of IoT cyber risk solutions. This review article discusses the, trends around opportunities and threats in cyber security for IIoT.


2021 ◽  
Vol 11 (20) ◽  
pp. 9422
Author(s):  
Young-Hoon Park ◽  
Yejin Kim ◽  
Shin-Ok Lee ◽  
Kwangman Ko

The security and privacy of electronic health records (EHRs) have received considerable attention from healthcare workers and researchers. To ensure security, various encryption and decryption schemes as well as key management protocols have been developed. However, owing to sharing and scalability issues, additional security technologies have been proposed. Nonetheless, these technologies cause other problems, such as efficiency issues. Blockchain-based EHR management systems have been proposed to overcome computational overhead. However, because most blockchain systems are installed by outsourcing companies, EHRs may be leaked to the company. Hence, we herein propose a blockchain-based EHR management scheme with proxy re-encryption. In this scheme, we set a proxy server that re-encrypts the ciphertext between file servers, thereby solving EHR sharing issues. Furthermore, because the server is separated from the blockchain system, the outsourcing company cannot manipulate the server or access the records. In addition, the blockchain assists in access control by using smart contracts, thereby enabling secure and efficient EHR sharing. By performing security analysis, we prove that our proposed scheme solves the aforementioned security problems. In addition, we experimentally demonstrate the efficient operation of the proposed system.


PLoS ONE ◽  
2021 ◽  
Vol 16 (10) ◽  
pp. e0258361
Author(s):  
Ashit Kumar Dutta

In recent years, advancements in Internet and cloud technologies have led to a significant increase in electronic trading in which consumers make online purchases and transactions. This growth leads to unauthorized access to users’ sensitive information and damages the resources of an enterprise. Phishing is one of the familiar attacks that trick users to access malicious content and gain their information. In terms of website interface and uniform resource locator (URL), most phishing webpages look identical to the actual webpages. Various strategies for detecting phishing websites, such as blacklist, heuristic, Etc., have been suggested. However, due to inefficient security technologies, there is an exponential increase in the number of victims. The anonymous and uncontrollable framework of the Internet is more vulnerable to phishing attacks. Existing research works show that the performance of the phishing detection system is limited. There is a demand for an intelligent technique to protect users from the cyber-attacks. In this study, the author proposed a URL detection technique based on machine learning approaches. A recurrent neural network method is employed to detect phishing URL. Researcher evaluated the proposed method with 7900 malicious and 5800 legitimate sites, respectively. The experiments’ outcome shows that the proposed method’s performance is better than the recent approaches in malicious URL detection.


2021 ◽  
Vol 5 (3) ◽  
pp. 62-63
Author(s):  
Woon Hau Chin ◽  
Chau Yuen ◽  
H. Vincent Poor ◽  
Mark Beach

Sign in / Sign up

Export Citation Format

Share Document