-
1261
The Mechanisms of Catalysis by Metallo 𝛽-Lactamases
Published 2008-01-01“…The metal-ion can act as a Lewis acid by co-ordination to the 𝛽-lactam carbonyl oxygen to facilitate nucleophilic attack and stabilise the negative charge developed on this oxygen in the tetrahedral intermediate anion. …”
Get full text
Article -
1262
Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
Published 2019-11-01“…In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol,a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed.Through the design of C commitment function,the real identity information of two participants involved was hidden.Based on RLWE difficult problem,under the premise to ensure identity anonymity,this protocol not only completed two-way identity authentication,but also ensured the integrity of the transmitted message,furthermore,the shared session key was negotiated.After been analyzed,in terms of protocol’s execution efficiency,only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme.Compared with Ding’s protocol,the length of public key was reduced by nearly 50%.With regard to security,the protocol could resist forgery,replay,key-copy,and man-in-the-middle attacks.It is proved that the proposed protocol satisfies the provable security under the eCK model.At the same time,the protocol is based on the RLWE problem of lattices,and can resist quantum computing attacks.…”
Get full text
Article -
1263
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
Get full text
Article -
1264
A privacy-preserving collaborative reputation system for mobile crowdsensing
Published 2018-09-01“…Moreover, it detects on-off attackers even if they report trusted data with high probability (0.8).…”
Get full text
Article -
1265
Big data security analysis method based on self-update threat intelligence database
Published 2018-03-01“…Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.Through the big data analysis technology,the collected data was extracted for safety value,and the value conversion from the collected data,threat information,threat knowledge to threat intelligence was realized,high-value threat intelligence of forming hidden,value selective,adversarial,predictive,and decision-making,evidence-based,time-sensitive was formed.Firstly,the limitations of the existing security analysis methods were analyzed.Then the construction method of threat intelligence database was introduced in detail.Finally,the security analysis method of big data based on self-renewing threat information database was described.The analysis of big data security based on the self-updated threat intelligence database could mine the hidden threats in internet data effectively and strengthen the existing security protection capabilities of internet companies so that the preemptive defense initiative could be mastered during the security game.…”
Get full text
Article -
1266
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01“…However, a secure authentication scheme has not been proposed for meteorological systems.This paper proposes a secure authentication scheme based on the blockchain network for meteorological systems resistant to various attacks. The Security of the proposed project against formal and informal attacks is evaluated, and the analysis results show that Securityrity of the proposed scheme resists active and passive attacks. …”
Get full text
Article -
1267
DNS abnormal behavior detection based on IPFIX
Published 2014-10-01“…An algorithm based on IPFIX network flow data is proposed.By using proposed algorithm,suspicious and abnormal DNS will be detected accurately,and DNS traffic amplification attack will be distinguished rapidly.This algorithm has been applied in the Tsinghua University campus network.In our practice,DNS abnormal behaviors have been detected and alarm information has been sent to administrators.Thus,abnormal attack behaviors are restrained in time,and the monitoring and warning for abnormal traffic are all realized.…”
Get full text
Article -
1268
Cryptanalysis of the Vesta-2M stream cipher
Published 2003-01-01“…The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.…”
Get full text
Article -
1269
Research on network survivability of distance vector routing protocol
Published 2010-01-01“…The network survivability based on distance vector routing protocol of the network was studied,and the definition of network survivability and its calculation method were given.In order to effectively improve the network survivability of the distance vector routing protocol,A method to measure the authenticity of the update routing message was proposed.Analysis showes that the method can effectively resist false routing messages attacks which is launched by the attack nodes in the network,so it can improve the network survivability of the distance vector routing protocol.…”
Get full text
Article -
1270
Intrusion Detection Systems in Wireless Sensor Networks: A Review
Published 2013-05-01“…Their distributed nature, multihop data forwarding, and open wireless medium are the factors that make WSNs highly vulnerable to security attacks at various levels. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. …”
Get full text
Article -
1271
Friends mechanism-based routing intrusion detection model for mobile ad hoc network
Published 2015-11-01“…The proposed model mainly focused on how to effectively detect routing invasions from mobile ad hoc network as well as how to accurately respond to the malicious nodes,providing a trusted routing environment.A lightweight intrusion detection model was proposed to based on the friends mechanism,taking black hole attack for example,the OPNET software gives the simulation test,and results show that the schemes can effectively detect attacks,it is validated and compared with other conventional models.…”
Get full text
Article -
1272
Security on a cryptographic model based on chaos
Published 2008-01-01“…The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these cryptosystems.Attack and corre-sponding improvement were deployed based on the model.The research is validated with a cryptanalysis on a chaotic en-cryption scheme presented by LI S J in Physics Letters A.…”
Get full text
Article -
1273
Survey on phishing detection research
Published 2020-10-01“…With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats caused by phishing attacks.Firstly,starting with the basic concepts of phishing,the current application scenarios of phishing identification were summarized.Then,the research status of phishing identification technology in detail were analyzed.Finally,possible future research directions were discussed.…”
Get full text
Article -
1274
Dynamic filtered keystream generator DF-FCSR-8
Published 2012-02-01“…Based on the investigation of the filtered key stream generator family F-FCSR using feedback with carry shift register(FCSR)as components,especially the reason what makes F-FCSR-Hv2 key stream generator failed,a dynamic filtered generator named DF-FCSR-8 was presented.This generator avoids Hell-Johansson attack and its key stream sequences can pass the test of NIST's suit STS.Finally,it can also resist many other attacks.…”
Get full text
Article -
1275
Terrorismo extremo e os tensionamentos nas democracias
Published 2005-01-01“…How can we relate the conflicts that emerge in the midst of big cities after terrorist attacks and the problems faced by Western democracies? …”
Get full text
Article -
1276
Feigning Acute Intermittent Porphyria
Published 2014-01-01“…Patients with this illness can have episodic life-threatening attacks characterized by abdominal pain, neurological deficits, and psychiatric symptoms. …”
Get full text
Article -
1277
Efficient identification protocol provably secure in standard model
Published 2009-01-01“…Based on the hardness assumption of the collusion attack algorithm with k traitors (K-CAA) in a gap Diffie-Hellman (GDH) group, a new and efficient identification protocol is proposed. …”
Get full text
Article -
1278
New bound of algebraic immunity of a class of Boolean function
Published 2016-10-01“…Algebraic immunity quantified the resistance of a Boolean function to the algebraic attack.Recently,Mesnager,et al showed that there were direct linked between the annihilators used in algebraic attacks and the coding theory.They showed that the lower bound of the algebraic immunity of Boolean functions could been derived from the minimum distance of the associated cyclic codes.An open problem proposed by Mesnager is settled with a detailed proof.Also,a lower bound of algebraic immunity of a class of Boolean functions will be introduced.…”
Get full text
Article -
1279
Cherry Fruit Fly, Rhagoletis cingulata (Loew) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“… The cherry fruit fly (adult) or cherry maggot (larva) attacks cherry and causes wormy fruits. In Florida, it attacks wild cherries and is of little economic importance. …”
Get full text
Article -
1280
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Passive attacks and active attacks do not get the plaintext. …”
Get full text
Article