Secur. Commun. Networks最新文献

筛选
英文 中文
An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications 用于安全医疗保健应用的基于区块链的匿名认证方案
Secur. Commun. Networks Pub Date : 2022-02-11 DOI: 10.1155/2022/2793116
A. Rajasekaran, M. Azees
{"title":"An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications","authors":"A. Rajasekaran, M. Azees","doi":"10.1155/2022/2793116","DOIUrl":"https://doi.org/10.1155/2022/2793116","url":null,"abstract":"Nowadays, continuous monitoring of a patient’s healthcare data has become a critical factor in human well-being. However, with the rapid advancement of wireless technology, doctors and healthcare professionals can monitor the patient’s healthcare data in real time. But to access the confidential patient’s data which is transferred through the open wireless medium, the secure transmission plays an important role. In this work, the privacy and the anonymity of the end-users (patient/doctor) are preserved using an anonymous blockchain-based authentication scheme. Moreover, in this work initially, mutual authentication is performed between the end-users, followed by encryption and decryption of confidential data. In addition, to avoid reauthentication of the patient again during the movement of a patient from one doctor to another, a transfer authentication protocol is performed between the doctors which enhances performance analysis. The security analysis section illustrates the withstanding capability of the proposed work against various vulnerable attacks. Finally, performance investigation of the proposed work reveals a reduction in computational and communication costs when compared to existing related works.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125976829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production 影视动画制作中基于深度学习的动作捕捉技术
Secur. Commun. Networks Pub Date : 2022-02-11 DOI: 10.1155/2022/6040371
Yating Wei
{"title":"Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production","authors":"Yating Wei","doi":"10.1155/2022/6040371","DOIUrl":"https://doi.org/10.1155/2022/6040371","url":null,"abstract":"With the popularity of King Kong, Pirates of the Caribbean 2, Avatar, and other films, the virtual characters in these films have become popular and well loved by audiences. The creation of these virtual characters is different from traditional 3D animation but is based on real character movements and expressions. An overview of several mainstream motion capture systems in the field of motion capture is presented, and the application of motion capture technology in film and animation is explained in detail. The current motion capture technology is mainly based on complex human markers and sensors, which are costly, while deep-learning-based human pose estimation is becoming a new option. However, most existing methods are based on a single person or picture estimation, and there are many challenges for video multiperson estimation. The experimental results show that a simple design of the human motion capture system is achieved.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Artificial Neural Network-Based Biomechanical Research on Elbow Injury of Tennis Serve 基于人工神经网络的网球发球肘部损伤生物力学研究
Secur. Commun. Networks Pub Date : 2022-02-09 DOI: 10.1155/2022/2725900
Jiaju Zhu, Meng Zhang
{"title":"A Novel Artificial Neural Network-Based Biomechanical Research on Elbow Injury of Tennis Serve","authors":"Jiaju Zhu, Meng Zhang","doi":"10.1155/2022/2725900","DOIUrl":"https://doi.org/10.1155/2022/2725900","url":null,"abstract":"Tennis is a sport with a large age span. Its technology is complex. Factors such as tennis racket and service position will affect the effect of players holding the ball, but often the service posture and strength will affect the players’ elbow tendon. Once the service posture is wrong or the strength is too strong, it will cause irreversible damage to players. Therefore, the study of artificial neural network training on tennis elbow injury is of great significance. Based on artificial neural network, this paper studies the biomechanics of elbow injury in tennis service. Firstly, this paper expounds the concept and characteristics of tennis service technology and studies the injury of tennis players’ elbow. Then this paper studies the artificial neural network technology and uses the experimental comparison method to test the force generated by the two groups of tennis players from different angles. The results show that, in the professional group, the forearm is in the internal rotation state before and after hitting the ball, while the beginner group is generally in the external rotation state. It can be inferred that, under the constant collision force, the reversal force absorbed by the beginner group in the swing process is greater than that of the professional group, which will increase the load of the supinator muscle on the antipronation, which will damage the supinator muscle, which is also one of the causes of the “tennis elbow” disease.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value 基于节点亲密度和信任值的混合机会物联网安全路由策略
Secur. Commun. Networks Pub Date : 2022-02-09 DOI: 10.1155/2022/6343764
Lin Yu, Gang Xu, Zhifei Wang, Na Zhang, Fengqi Wei
{"title":"A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value","authors":"Lin Yu, Gang Xu, Zhifei Wang, Na Zhang, Fengqi Wei","doi":"10.1155/2022/6343764","DOIUrl":"https://doi.org/10.1155/2022/6343764","url":null,"abstract":"Routing strategy is one of the most important researches in Opportunistic Internet of Things (IoT), and it highly influences the efficiency of data transmission. In this paper, a hybrid Opportunistic IoT secure routing strategy based on node intimacy and trust value (HIRouter) is proposed to resolve the problem of unbalanced transmission efficiency and security in the message delivery process. According to the records of node encounter and message forwarding, the strategy proposed in this paper can calculate nodes’ intimacy and trust value. The messages are then forwarded based on the intimacy and trust value between nodes. Experimental results verify that HIRouter algorithm we proposed can improve the message delivery rates and reduce the overhead rate in the Opportunistic IoT with dense nodes and frequent interactions between nodes.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamical Behavior of Hybrid Propagation of Computer Viruses 计算机病毒混合传播的动力学行为
Secur. Commun. Networks Pub Date : 2022-02-09 DOI: 10.1155/2022/2576685
Qingyi Zhu, Pingfan Xiang, Xuhang Luo, Chenquan Gan
{"title":"Dynamical Behavior of Hybrid Propagation of Computer Viruses","authors":"Qingyi Zhu, Pingfan Xiang, Xuhang Luo, Chenquan Gan","doi":"10.1155/2022/2576685","DOIUrl":"https://doi.org/10.1155/2022/2576685","url":null,"abstract":"Considering the horizontal and vertical propagation of computer viruses over the Internet, this article proposes a hybrid susceptible-latent-breaking-recovered-susceptible (SLBRS) model. Through mathematical analysis of the model, two equilibria (virus-free and virose equilibria) and their global stabilities are both proved depending on the basic reproduction number \u0000 \u0000 \u0000 \u0000 R\u0000 \u0000 \u0000 0\u0000 \u0000 \u0000 \u0000 , which is affected by the vertical propagation of infected computers. Moreover, the feasibility of the obtained results is verified by numerical simulations. Finally, the dependence of \u0000 \u0000 \u0000 \u0000 R\u0000 \u0000 \u0000 0\u0000 \u0000 \u0000 \u0000 on system parameters and the parameters affecting the stability level of infected computers are both analyzed.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"190 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120863764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems 基于格子的网络物理系统自增强授权可访问隐私认证
Secur. Commun. Networks Pub Date : 2022-02-09 DOI: 10.1155/2022/8995704
Jinhui Liu, Yong Yu, Houzhen Wang, Huanguo Zhang
{"title":"Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems","authors":"Jinhui Liu, Yong Yu, Houzhen Wang, Huanguo Zhang","doi":"10.1155/2022/8995704","DOIUrl":"https://doi.org/10.1155/2022/8995704","url":null,"abstract":"Healthcare cyber-physical system significantly facilitates healthcare services and patient treatment effectiveness by analyzing patients’ health information data conveniently. Nevertheless, it also develops the threats to the confidentiality of health information, patients’ privacy, and decidability of medical disputes. And, with the advances of quantum computing technology, most existing anonymous authentication schemes are becoming a growing threat to traditional cryptosystems. To address these problems, for healthcare cyber-physical systems, we propose a new lattice-based self-enhancement authorized accessible privacy authentication scheme by using a strong designated verifier double-authentication-preventing signature technique, called SEAPA. The SEAPA achieves three security and privacy requirements including unforgeability, anonymity for patients’ information, and self-enhancement for patients themselves. A detailed security proof shows our proposal achieves those required security goals. Finally, our construction is demonstrated by parameter analysis and performance evaluation to have reasonable efficiency.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monitoring and Analysis of English Classroom Teaching Quality Based on Big Data 基于大数据的英语课堂教学质量监测与分析
Secur. Commun. Networks Pub Date : 2022-02-08 DOI: 10.1155/2022/5365807
Zhang Xun
{"title":"Monitoring and Analysis of English Classroom Teaching Quality Based on Big Data","authors":"Zhang Xun","doi":"10.1155/2022/5365807","DOIUrl":"https://doi.org/10.1155/2022/5365807","url":null,"abstract":"In order to deal with the problems of low evaluation accuracy and long evaluation time in the traditional English classroom teaching quality monitoring and evaluation methods, this study proposes an English classroom teaching quality monitoring and evaluation method based on big data. According to the selection principle of English classroom teaching quality monitoring factors, this study analyzes the English classroom teaching quality monitoring factors, constructs the English classroom teaching quality monitoring index system, obtains the monitoring index data, filters and compresses the monitoring data, and takes the preprocessed English classroom teaching quality monitoring data as the evaluation index. This study uses the principal component analysis method to calculate the weight of the English classroom teaching quality evaluation index and constructs an English classroom teaching quality evaluation model. The simulation results show that the proposed method has high accuracy and short evaluation time.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Traditional and Hybrid Access Control Models: A Detailed Survey 传统和混合访问控制模型:详细调查
Secur. Commun. Networks Pub Date : 2022-02-07 DOI: 10.1155/2022/1560885
Muhammad Umar Aftab, A. Hamza, Ariyo Oluwasanmi, Xuyun Nie, M. Sarfraz, Danish Shehzad, Zhiguang Qin, Ammar Rafiq
{"title":"Traditional and Hybrid Access Control Models: A Detailed Survey","authors":"Muhammad Umar Aftab, A. Hamza, Ariyo Oluwasanmi, Xuyun Nie, M. Sarfraz, Danish Shehzad, Zhiguang Qin, Ammar Rafiq","doi":"10.1155/2022/1560885","DOIUrl":"https://doi.org/10.1155/2022/1560885","url":null,"abstract":"Access control mechanisms define the level of access to the resources among specified users. It distinguishes the users as authorized or unauthorized based on appropriate policies. Several traditional and hybrid access control models have been proposed in previous researches over the last few decades. In this study, we provide a detailed survey of access control models and compare the traditional and hybrid access control models based on their access control criteria. This survey focuses on the growing literature of access control models and summarizes it through comparative analysis, identifying limitations and illustrating the advantages of both traditional and hybrid models. This study will help the researchers to get a deep understanding of the traditional and hybrid access control models.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134478211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses 具有隐身地址的可链接环签名方案的混合设计
Secur. Commun. Networks Pub Date : 2022-02-07 DOI: 10.1155/2022/1417607
Weizhou Li, Zhiqiang Lin, Qi Chen
{"title":"A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses","authors":"Weizhou Li, Zhiqiang Lin, Qi Chen","doi":"10.1155/2022/1417607","DOIUrl":"https://doi.org/10.1155/2022/1417607","url":null,"abstract":"Blockchain is a transformational technology which affects finance, Internet, and politics. However, many privacy protection problems for blockchain are waiting to be solved. In this study, we propose a novel linkable ring signature scheme with stealth addresses, which enables the payer and payee of the transaction to be anonymous and unlinkable in the cryptocurrency. The scheme is combined with an elliptic curve discrete logarithm (ECD logarithm)-based key encapsulation mechanism (KEM) stage and a lattice-based signature stage. The master public key and master secret key are much smaller compared with the previous scheme. Complete secure proof of the scheme is also presented in this study.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123736955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain 基于代理签名和区块链的去中心化隐私保护电子报告方案
Secur. Commun. Networks Pub Date : 2022-02-07 DOI: 10.1155/2022/5424395
Huiying Zou, Xiaofan Liu, Wei Ren, Tianqing Zhu
{"title":"A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain","authors":"Huiying Zou, Xiaofan Liu, Wei Ren, Tianqing Zhu","doi":"10.1155/2022/5424395","DOIUrl":"https://doi.org/10.1155/2022/5424395","url":null,"abstract":"The electronic reporting system can alleviate the problems in terms of efficiency, content confidentiality, and reporter privacy imposed in the traditional reporting system. Relying on anonymity, the privacy of reporters can be protected, but the authentication of reporters with fake names should also be maintained. If authenticated anonymity is guaranteed, the reporters may still conduct misbehaviors such as submitting fake reports after the authentication. To address the above dilemma, we propose to apply a proxy signature to achieve authenticated anonymity and employ blockchain to maintain anonymity yet guarantee traceability for reporters’ misbehaviors. We also propose a new proxy signature scheme in this paper by module lattice for postquantum security. The extensive analysis justified our proposed scheme is secure and manageable.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114157042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信