Showing 1,181 - 1,200 results of 3,648 for search '"Attacker"', query time: 0.11s Refine Results
  1. 1181

    Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA by WU Zhen, CHEN Yun, CHEN Jun, WANG Min

    Published 2010-01-01
    “…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
    Get full text
    Article
  2. 1182

    Related-key impossible boomerang cryptanalysis on TWINE by Min XIE, Feng TIAN, Jiaqi LI

    Published 2019-09-01
    “…In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.…”
    Get full text
    Article
  3. 1183

    Quantum dialogue protocol based on self-dual quantum low density parity check codes by Fen LIU, Zhenxing HE, Pengao XU, Hongyang MA

    Published 2020-08-01
    “…In quantum channels,particles are usually affected by noise during transmission.A quantum dialogue protocol based on self-dual quantum low density parity check codes was proposed to resist noise attacks.A combination of B construction method and U construction method was used to construct a self-dual quantum low density parity check matrix.The proposed quantum dialogue protocol can resist common external attacks,and there was no information leakage,which improved the efficiency of encoding and decoding.The security of quantum dialogue protocol was studied from the perspective of error correction.Security analysis shows that the protocol has sufficient security and can effectively resist common malicious attacks.…”
    Get full text
    Article
  4. 1184

    A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm by Abdulle Hassan Mohamud

    Published 2025-01-01
    “…Several types of cryptoanalysis attacks such as brute-forcing, autocorrelation and dictionary attacks are comparatively evaluated and the end result of SRFFT evaluation indicates that SRFFT is preferable in many practical encryption applications since SRFFT complexity increases with the range of split-radix computations thus eliminating the potential chances of cryptanalysis attacks.…”
    Get full text
    Article
  5. 1185

    Approach to detecting SQL injection behaviors in network environment by Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI

    Published 2016-02-01
    “…SQL injection attack is one of the main threats that many Web applications faced with. …”
    Get full text
    Article
  6. 1186

    Optimal strategy selection method for moving target defense based on signaling game by Lyu JIANG, Hengwei ZHANG, Jindong WANG

    Published 2019-06-01
    “…To solve the problem of the optimal strategy selection for moving target defense,the defense strategy was defined formally,the defense principle from the perspective of attack surface shifting and exploration surface enlarging was taken into account.Then,network attack-defense behaviors were analyzed from the sight of dynamic confrontation and bounded information.According to the analysis of attack-defense game types and confrontation process,the moving target defense model based on signaling game was constructed.Meanwhile,the method to quantify strategies was improved and the solution of perfect Bayesian equilibrium was proposed.Furthermore,the optimal defense strategy selection algorithm was designed by the equilibrium analysis.Finally,the simulation demonstrates the effectiveness and feasibility of the proposed optimal strategy and selection method.…”
    Get full text
    Article
  7. 1187

    Authentication Scheme Based on Agents for Heterogeneous Cloud by Jiwen Guo, Xianwei Zhou

    Published 2013-03-01
    “…Considering the comp1exity of dep1oying network nodes, 1arge amount of ca1cu1ation and frequent mutua1 messages for heterogeneous c1oud, two service patterns, i.e.authentication agent and service agent were proposed, A1so, the proxy digita1 signature schemes with 1ower handshaking numbers were devised and the efficiency of authentication imp1ementation was improved.In addition, the scheme can effective1y guard against the rep1ay attack, the impersonation attack and the man-in-the-midd1e attack of the ma1icious nodes,and so on.…”
    Get full text
    Article
  8. 1188

    Recapture voice replay detection based on phase spectrum by Can LI, Rangding WANG, Diqun YAN, Yanan CHEN

    Published 2017-08-01
    “…Meanwhile,the equal error rate (EER) of the ASV system has dropped about 22% with this method being integrated,which indicates that the system’s ability of resisting playback attack is enhanced.…”
    Get full text
    Article
  9. 1189

    A Zero-Watermarking Scheme for Vector Map Based on Feature Vertex Distance Ratio by Yuwei Peng, Mingliang Yue

    Published 2015-01-01
    “…Due to the specially designed cover data, the proposed scheme is robust to geometrical attacks, vertex attacks, and object attacks. The results of extensive experiments also demonstrate the robustness of the proposed scheme.…”
    Get full text
    Article
  10. 1190

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    “…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
    Get full text
    Article
  11. 1191

    Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network by Xiao-rui ZHONG, Chun-guang MA

    Published 2014-03-01
    “…Witnesses of a dynamic accumulator (DA) can ensure whether an object has been accumulated.On the basis of this,node membership in a cluster was verified and a novel authenticated group key management protocol was proposed,which supports node revocation and addition.In order to establish a group key for a cluster,each member provides their assigned number to join accumulation.DAAG can not only guarantee the confidentiality of witnesses,but also keep non-members from calculating novel group keys by binding witness with group key update.The security and performance analyses show that DAAG is resistant against replay attack,forgery attack and collusion attack,and can provide forward security and backward security.…”
    Get full text
    Article
  12. 1192

    Chaotic Image Encryption Based on Running-Key Related to Plaintext by Cao Guanghui, Hu Kai, Zhang Yizhi, Zhou Jun, Zhang Xing

    Published 2014-01-01
    “…Therefore, it can resist brute-force, reconstruction attack, and differential attack.…”
    Get full text
    Article
  13. 1193

    Performance Comparison of IoT Classification Models using Ensemble Stacking and Feature Importance by nabila putri setiawan, Adhitya Nugraha, Ardytha Luthfiarta, Yudha Mulyana

    Published 2024-11-01
    “…This research utilizes the CIC IoT ATTACK 2023 dataset from the University of Brunswick, which consists of 46 million data on various types of attacks on IoT devices, such as DDoS, DoS, Brute Force, Spoofing, and Mirai attacks. …”
    Get full text
    Article
  14. 1194

    Research on mimic decision method based on deep learning by Xiaohan YANG, Guozhen CHENG, Wenyan LIU, Shuai ZHANG, Bing HAO

    Published 2024-02-01
    “…Due to software and hardware differentiation, the problem of false positives mistakenly identified as network attack behavior caused by inconsistent mimic decision results frequently occurs.Therefore, a mimic decision method based on deep learning was proposed.By constructing an unsupervised autoencoder-decoder deep learning model, the deep semantic features of diverse normal response data were explored from different executions and its statistical rules were analyzed and summarized.Additionally, the offline learning-online decision-making mechanism and the feedback optimization mechanism were designed to solve false positive problem, thereby accurately detecting network attacks and improving target system security resilience.Since statistical rules of normal response data was understood and mastered by deep learning model, the mimic decision results among different executions could remain consistent, indicating that the target system was in a secure state.However, once the target system was subjected to a network attacks, the response data outputted by the different executions was deviated from statistical distribution of deep learning model.Therefore, inconsistent mimic decision results were presented, indicating that the affected execution was under attack and the target system was exposed to potential security threats.The experiments show that the performance of the proposed method is significantly superior to the popular mimic decision methods, and the average prediction accuracy is improved by 14.89%, which is conducive to integrating the method into the mimic transformation of real application to enhance the system’s defensive capability.…”
    Get full text
    Article
  15. 1195

    Evaluation of Relationship between Water Absorption and Durability of Concrete Materials by S. P. Zhang, L. Zong

    Published 2014-01-01
    “…After 28-days curing, compressive strength, permeability, sulfate attack, and chloride ion diffusion of concrete samples were investigated. …”
    Get full text
    Article
  16. 1196

    Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System by Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju

    Published 2018-01-01
    “…Interestingly, recent research studies on the web application security centre focus on attack prevention and mechanisms for secure coding; recent methods for those attacks do not only generate high false positives but also have little considerations for the users who oftentimes are the victims of malicious attacks. …”
    Get full text
    Article
  17. 1197

    The Effect of Microcylinder Shape on Enhancing the Aerodynamics of Airfoils at a Low Reynolds Number by Renata Gnatowska, Karolina Gajewska

    Published 2024-12-01
    “…The experiment demonstrated that the microcylinder effectively reduced boundary layer detachment at this angle of attack.…”
    Get full text
    Article
  18. 1198

    A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings by Nai-Wei Lo, Jia-Lun Tsai

    Published 2014-01-01
    “…In addition, a new security model is proposed to describe proxy signcryption scheme; based on the security model we show that the proposed scheme is provably secure in terms of indistinguishability under adaptive chosen ciphertext attack (IND-CCA2), unforgeability under adaptive chosen message attack (EF-CMA), and unforgeability under adaptive chosen warrant attack (EF-CWA).…”
    Get full text
    Article
  19. 1199

    Coexistence and Competition between Tomicus yunnanensis and T. minor (Coleoptera: Scolytinae) in Yunnan Pine by Rong Chun Lu, Hong Bin Wang, Zhen Zhang, John A. Byers, You Ju Jin, Hai Feng Wen, Wen Jian Shi

    Published 2012-01-01
    “…The highest attack density of T. Yunnanensis was 297 egg galleries/m2, and the highest attack density of T. minor was 305 egg galleries/m2. …”
    Get full text
    Article
  20. 1200

    The damage evolution law and life prediction of mortar under Freeze-thaw cycles and sulfate corrosion based on entropy weight method by Yizheng Jiang, Yuang Cui, Yi Song, Xuepeng Zhang

    Published 2025-07-01
    “…Freeze-thaw cycles coupled with sulfate attack represent one of the most challenging service environments for concrete. …”
    Get full text
    Article