-
1341
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01“…Multivariable public key cryptography is one of the reliable candidates for anti-quantum cryptography.The Simple Matrix scheme is constructed using the operations between three matrices.An improved version of the Simple Matrix scheme was proposed.It is constructed by using two flat matrices with random quadratic polynomials,so that the rank attacks is infeasible for the new scheme,and the algebraic attacks breaks the system is at least as hard as solving a set of random quadratic equations.The new scheme will improve the proportion of ciphertext and plaintext to 2 times or more,break the fixed proportion of ciphertext and plaintext,so that it has a flexible proportion to adapt to different needs.…”
Get full text
Article -
1342
Analysis and improvement of sensor networks security protocol
Published 2011-01-01“…A suit of security protocols for sensor networks was presented by A.Perrig.The security of the protocols was analyzed,and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder.In that case,the intruder impersonates the node and creates false requests.An improved protocol to this attack was proposed.The security of improved protocol was analyzed by the extended strand spaces,where two main security properties,authenticity and confidentiality,were checked.And the analysis proves the correctness of the protocol.The extended strand spaces also gives a practical base for further application of strand spaces in analyzing complicated protocols.…”
Get full text
Article -
1343
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01“…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
Get full text
Article -
1344
A playback speech detection algorithm based on log inverse Mel-frequency spectral coefficient
Published 2018-05-01“…The popularity and portability of high-fidelity audio recording equipment and playback equipment poses a serious challenge for speaker recognition systems against playback attacks.Based on the differences between the original speech and the playback speech in high frequency region,the algorithm reversed the Mel-filter bank in Mel-frequency cepstral coefficient (MFCC) calculation,and the coefficients before the DCT were used as the features of the algorithm.SVM was utilized as the classifier.Experimental results show that this algorithm can effectively detect the playback speech.In addition,the algorithm is integrated into the GMM-UBM speaker recognition system,which significantly improves the systems’ capability of resisting the playback attack.…”
Get full text
Article -
1345
Study on electronic evidence acquisition and analysis method over Windows logs
Published 2012-11-01“…In order to collect logs in real time,two methods to acquire Windows logs in real time were proposed respectively according to the two types of log file formats.Based on acquiring logs,an approach for correlating log files with atomic attack functions was proposed.After the correlation,atomic attack functions can be analyzed instead of log files,which can greatly decrease the time of analysis.A time based log correlation and event reconstruction method was proposed to reconstruct the computer criminal scenarios.Experimental results show that log evidences can be acquired and the crime process can be reconstructed effectively.…”
Get full text
Article -
1346
Paroxysmal Compulsion to Handle Keys in a Computer Operator Due To Meningioma in the Left Supplementary Motor Area
Published 1998-01-01“…We describe the case of a computer operator who experienced paroxysmal attacks several times in which she felt a compulsion to handle keys with her right hand or actually her right hand moved involuntarily in a key-handling rhythm. …”
Get full text
Article -
1347
Implementation architecture of mimic security defense based on SDN
Published 2017-10-01“…To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncertainty of system so as to improve network security.Based on the software defined networking (SDN),an implementation architecture of MSD was proposed.First,diverse functional equivalent variants for the protected target were constructed,then leverage the rich programmability and flexibility of SDN to realize the dynamic scheduling and decision-making functions on SDN controller.Simulation and experimental results prove the availability and the intrusion tolerant ability of the architecture.…”
Get full text
Article -
1348
Lightweight and secure vehicle track verification scheme via broadcast communication channels
Published 2023-10-01“…In intelligent transportation systems, it is crucial for smart vehicles to broadcast real-time vehicle track messages to coordinate driving decisions and ensure driving safety.However, attackers can manipulate vehicle tracks by modifying timestamps or manipulating signal frequencies, posing a threat to security.To address this problem, a lightweight vehicle track verification scheme was proposed, utilizing the broadcast communication channels to achieve secure verification of vehicle tracks without any special hardware support.Without time synchronization, each verifier calculated the time interval between the reception time of the message and the sending timestamp.Spatial position constraint equations are formulated by combining these time intervals between any two verifiers, effectively defending against timestamp forgery attacks.Additionally, each verifier calculates the Doppler frequency shift between the arrival frequency and the scheduled transmit frequency.Velocity vector constraint equations were formulated by combining these frequency shifts between any two verifiers, providing defense against carrier frequency manipulation attacks.Formal analysis shows that increasing the number of verifiers improves the accuracy of the proposed verification scheme.Experimental results in a real-world environment further validate that the proposed verification scheme exhibits the best performance when the number of verifiers is set to 3.Compared to the existing solution, the proposed verification scheme has a higher accuracy, lower false rejection rate, and lower false acceptance rate when validating true vehicle track and false vehicle track separately.…”
Get full text
Article -
1349
Keefektivan Ekstrak Daun Sirih Hutan Sebagai Pengendali Serangan Hama Penggerek Buah Kopi (Hypothenemus hampei Ferrari) di Lapangan
Published 2024-11-01“…CBB attacks can reduce the quantity and quality of coffee plant production. …”
Get full text
Article -
1350
Computational assessment of winglet-induced variations in pressure coefficients on NACA 4418 aircraft wings
Published 2025-01-01“…The results reveal that the pressure coefficient becomes high at 20%C, then decreases to a minimum value at 45%C and then rises gradually up to again a higher value at 80%C for the angles of attack of − 4° and 0° at three airfoil velocity. However, for the angles of attack of 4°, 8°, 12°, 16°, 20° and 24°, the pressure coefficient becomes minimum at 20%C, then gradually increases and finally becomes maximum at 80%C for three airfoil velocities. …”
Get full text
Article -
1351
Influence of Roughness on the Asymmetric Flow Field of a Slender Body
Published 2022-01-01“…Low speed and high angle of attack are problems that must be faced in vertical launching missiles. …”
Get full text
Article -
1352
Crisis Spreading Model of the Shareholding Networks of Listed Companies and Their Main Holders and Their Controllability
Published 2018-01-01“…However, the crisis will spread at a high speed and cause catastrophic damage if there are some failures or attacks on hub vertices in the networks. Under this condition, the networks show obvious vulnerability. …”
Get full text
Article -
1353
Damage Assessment of an RC Pier under Noncontact Blast Loading Based on P-I Curves
Published 2018-01-01“…Since the 9.11 attacks in New York, terrorist attacks, military strikes, and accidental explosions have caused serious damage to various infrastructures around the world. …”
Get full text
Article -
1354
Avoiding catastrophic overfitting in fast adversarial training with adaptive similarity step size.
Published 2025-01-01“…However, since fast adversarial training uses single-step adversarial attacks instead of multi-step attacks, the generated adversarial examples lack diversity, making models prone to catastrophic overfitting and loss of robustness. …”
Get full text
Article -
1355
Interactive effects of Rhizobacteria for Managing Spodoptera exigua on Shallot Plants (Allium cepa Linnaeus) under Field Conditions
Published 2024-06-01“… Spodoptera exigua is the primary pest attacking shallot plants from the vegetative to the generative phase. …”
Get full text
Article -
1356
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT
Published 2025-01-01“…While several authentication techniques offer protection against quantum attacks, they often incur high communication and computation costs, underscoring the need for further advancement. …”
Get full text
Article -
1357
DIMINISHING RELIGIOUS EXTREMIST UNDERSTANDING
Published 2022-12-01“…With this interpretation, it is understood that the qital verses are not orders to wage war against unbelievers without the existence or threat of attacks. On the contrary, these verses placed war as a means to retaliate against the unbelievers who have attacked first or are known to have plans to attack (kill). …”
Get full text
Article -
1358
Statistical and Reliability Analysis of the Iran Railway System as a Complex Network
Published 2022-01-01“…Also, the network vulnerability to station failures has been studied based on different attacks. Accordingly, in the first step of this work, the city stations have been extracted from Iran railway information to construct the network. …”
Get full text
Article -
1359
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01“…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
Get full text
Article -
1360
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…With this model, we find two sets of 7-round differential characteristics for PRINCE with less guessed key bits and use them to present a multiple differential attack against 11-round PRINCE, which improves the known single-key attack on PRINCE by one round to our knowledge.…”
Get full text
Article