Showing 1,341 - 1,360 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1341

    Simple Matrix encryption scheme with variable ciphertext length by Zhong WANG, Yiliang HAN

    Published 2018-04-01
    “…Multivariable public key cryptography is one of the reliable candidates for anti-quantum cryptography.The Simple Matrix scheme is constructed using the operations between three matrices.An improved version of the Simple Matrix scheme was proposed.It is constructed by using two flat matrices with random quadratic polynomials,so that the rank attacks is infeasible for the new scheme,and the algebraic attacks breaks the system is at least as hard as solving a set of random quadratic equations.The new scheme will improve the proportion of ciphertext and plaintext to 2 times or more,break the fixed proportion of ciphertext and plaintext,so that it has a flexible proportion to adapt to different needs.…”
    Get full text
    Article
  2. 1342

    Analysis and improvement of sensor networks security protocol by YAN Li-li1, PENG Dai-yuan1, GAO Yue-xiang1

    Published 2011-01-01
    “…A suit of security protocols for sensor networks was presented by A.Perrig.The security of the protocols was analyzed,and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder.In that case,the intruder impersonates the node and creates false requests.An improved protocol to this attack was proposed.The security of improved protocol was analyzed by the extended strand spaces,where two main security properties,authenticity and confidentiality,were checked.And the analysis proves the correctness of the protocol.The extended strand spaces also gives a practical base for further application of strand spaces in analyzing complicated protocols.…”
    Get full text
    Article
  3. 1343

    Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA

    Published 2012-04-01
    “…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
    Get full text
    Article
  4. 1344

    A playback speech detection algorithm based on log inverse Mel-frequency spectral coefficient by Lang LIN, Rangding WANG, Diqun YAN, Can LI

    Published 2018-05-01
    “…The popularity and portability of high-fidelity audio recording equipment and playback equipment poses a serious challenge for speaker recognition systems against playback attacks.Based on the differences between the original speech and the playback speech in high frequency region,the algorithm reversed the Mel-filter bank in Mel-frequency cepstral coefficient (MFCC) calculation,and the coefficients before the DCT were used as the features of the algorithm.SVM was utilized as the classifier.Experimental results show that this algorithm can effectively detect the playback speech.In addition,the algorithm is integrated into the GMM-UBM speaker recognition system,which significantly improves the systems’ capability of resisting the playback attack.…”
    Get full text
    Article
  5. 1345

    Study on electronic evidence acquisition and analysis method over Windows logs by Xiao-mei DONG, Xu-dong LIU, Xiao-hua LI, Ya-jie FEI

    Published 2012-11-01
    “…In order to collect logs in real time,two methods to acquire Windows logs in real time were proposed respectively according to the two types of log file formats.Based on acquiring logs,an approach for correlating log files with atomic attack functions was proposed.After the correlation,atomic attack functions can be analyzed instead of log files,which can greatly decrease the time of analysis.A time based log correlation and event reconstruction method was proposed to reconstruct the computer criminal scenarios.Experimental results show that log evidences can be acquired and the crime process can be reconstructed effectively.…”
    Get full text
    Article
  6. 1346

    Paroxysmal Compulsion to Handle Keys in a Computer Operator Due To Meningioma in the Left Supplementary Motor Area by H. Tei, M. Iwata, Y. Miura

    Published 1998-01-01
    “…We describe the case of a computer operator who experienced paroxysmal attacks several times in which she felt a compulsion to handle keys with her right hand or actually her right hand moved involuntarily in a key-handling rhythm. …”
    Get full text
    Article
  7. 1347

    Implementation architecture of mimic security defense based on SDN by Zhen-peng WANG, Hong-chao HU, Guo-zhen CHENG, Chuan-hao ZHANG

    Published 2017-10-01
    “…To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncertainty of system so as to improve network security.Based on the software defined networking (SDN),an implementation architecture of MSD was proposed.First,diverse functional equivalent variants for the protected target were constructed,then leverage the rich programmability and flexibility of SDN to realize the dynamic scheduling and decision-making functions on SDN controller.Simulation and experimental results prove the availability and the intrusion tolerant ability of the architecture.…”
    Get full text
    Article
  8. 1348

    Lightweight and secure vehicle track verification scheme via broadcast communication channels by Zhiqiang NING, Yuanyuan WANG, Chi ZHANG, Lingbo WEI, Nenghai YU, Yue HAO

    Published 2023-10-01
    “…In intelligent transportation systems, it is crucial for smart vehicles to broadcast real-time vehicle track messages to coordinate driving decisions and ensure driving safety.However, attackers can manipulate vehicle tracks by modifying timestamps or manipulating signal frequencies, posing a threat to security.To address this problem, a lightweight vehicle track verification scheme was proposed, utilizing the broadcast communication channels to achieve secure verification of vehicle tracks without any special hardware support.Without time synchronization, each verifier calculated the time interval between the reception time of the message and the sending timestamp.Spatial position constraint equations are formulated by combining these time intervals between any two verifiers, effectively defending against timestamp forgery attacks.Additionally, each verifier calculates the Doppler frequency shift between the arrival frequency and the scheduled transmit frequency.Velocity vector constraint equations were formulated by combining these frequency shifts between any two verifiers, providing defense against carrier frequency manipulation attacks.Formal analysis shows that increasing the number of verifiers improves the accuracy of the proposed verification scheme.Experimental results in a real-world environment further validate that the proposed verification scheme exhibits the best performance when the number of verifiers is set to 3.Compared to the existing solution, the proposed verification scheme has a higher accuracy, lower false rejection rate, and lower false acceptance rate when validating true vehicle track and false vehicle track separately.…”
    Get full text
    Article
  9. 1349
  10. 1350

    Computational assessment of winglet-induced variations in pressure coefficients on NACA 4418 aircraft wings by Md. Abdullah, Mohammad Zoynal Abedin

    Published 2025-01-01
    “…The results reveal that the pressure coefficient becomes high at 20%C, then decreases to a minimum value at 45%C and then rises gradually up to again a higher value at 80%C for the angles of attack of − 4° and 0° at three airfoil velocity. However, for the angles of attack of 4°, 8°, 12°, 16°, 20° and 24°, the pressure coefficient becomes minimum at 20%C, then gradually increases and finally becomes maximum at 80%C for three airfoil velocities. …”
    Get full text
    Article
  11. 1351

    Influence of Roughness on the Asymmetric Flow Field of a Slender Body by Kai Wei, Shaosong Chen, Yihang Xu, Dongdong Tang

    Published 2022-01-01
    “…Low speed and high angle of attack are problems that must be faced in vertical launching missiles. …”
    Get full text
    Article
  12. 1352

    Crisis Spreading Model of the Shareholding Networks of Listed Companies and Their Main Holders and Their Controllability by Yuanyuan Ma, Lingxuan Li

    Published 2018-01-01
    “…However, the crisis will spread at a high speed and cause catastrophic damage if there are some failures or attacks on hub vertices in the networks. Under this condition, the networks show obvious vulnerability. …”
    Get full text
    Article
  13. 1353

    Damage Assessment of an RC Pier under Noncontact Blast Loading Based on P-I Curves by Lu Liu, Zhouhong Zong, Biao Tang, Minghong Li

    Published 2018-01-01
    “…Since the 9.11 attacks in New York, terrorist attacks, military strikes, and accidental explosions have caused serious damage to various infrastructures around the world. …”
    Get full text
    Article
  14. 1354

    Avoiding catastrophic overfitting in fast adversarial training with adaptive similarity step size. by Jie-Chao Zhao, Jin Ding, Yong-Zhi Sun, Ping Tan, Ji-En Ma, You-Tong Fang

    Published 2025-01-01
    “…However, since fast adversarial training uses single-step adversarial attacks instead of multi-step attacks, the generated adversarial examples lack diversity, making models prone to catastrophic overfitting and loss of robustness. …”
    Get full text
    Article
  15. 1355

    Interactive effects of Rhizobacteria for Managing Spodoptera exigua on Shallot Plants (Allium cepa Linnaeus) under Field Conditions by Hidrayani Hidrayani, Nurbailis Nurbailis, Fitri Yeni, Zahlul Ikhsan

    Published 2024-06-01
    “… Spodoptera exigua is the primary pest attacking shallot plants from the vegetative to the generative phase. …”
    Get full text
    Article
  16. 1356

    Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT by Arman Ahmad, S. Jagatheswari

    Published 2025-01-01
    “…While several authentication techniques offer protection against quantum attacks, they often incur high communication and computation costs, underscoring the need for further advancement. …”
    Get full text
    Article
  17. 1357

    DIMINISHING RELIGIOUS EXTREMIST UNDERSTANDING by Muh Gufron Hidayatullah, Abu Bakar

    Published 2022-12-01
    “…With this interpretation, it is understood that the qital verses are not orders to wage war against unbelievers without the existence or threat of attacks. On the contrary, these verses placed war as a means to retaliate against the unbelievers who have attacked first or are known to have plans to attack (kill). …”
    Get full text
    Article
  18. 1358

    Statistical and Reliability Analysis of the Iran Railway System as a Complex Network by Melika Mosayyebi, Hadi Shakibian, Reza Azmi

    Published 2022-01-01
    “…Also, the network vulnerability to station failures has been studied based on different attacks. Accordingly, in the first step of this work, the city stations have been extracted from Iran railway information to construct the network. …”
    Get full text
    Article
  19. 1359

    Anonymous trust management scheme of VANET based on attribute signature by Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO

    Published 2023-04-01
    “…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
    Get full text
    Article
  20. 1360

    Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS by Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi

    Published 2024-01-01
    “…With this model, we find two sets of 7-round differential characteristics for PRINCE with less guessed key bits and use them to present a multiple differential attack against 11-round PRINCE, which improves the known single-key attack on PRINCE by one round to our knowledge.…”
    Get full text
    Article