-
21
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published 2014-01-01“…We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. …”
Get full text
Article -
22
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality
Published 2022-09-01“…Abstract Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. …”
Get full text
Article -
23
-
24
-
25
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: “…side channel attack…”
Get full text
Article -
26
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: Get full text
Article -
27
-
28
-
29
-
30
An Adversarial Attack via Penalty Method
Published 2025-01-01Subjects: “…Adversarial attack…”
Get full text
Article -
31
Survey on application of attack graph technology
Published 2017-11-01Subjects: “…attack graph…”
Get full text
Article -
32
Analysis of the success probability of cube attack
Published 2012-10-01Subjects: “…cube attack…”
Get full text
Article -
33
Adversarial attacks and defenses in deep learning
Published 2020-10-01Subjects: Get full text
Article -
34
-
35
-
36
-
37
Attacks on Telex Internet anticensorship system
Published 2014-09-01Subjects: Get full text
Article -
38
-
39
-
40
Detecting LDoS attack based on ASPQ
Published 2012-05-01“…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
Get full text
Article