Showing 1,521 - 1,540 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1521

    DWB-AES: an implementation of dynamic white-box based on AES by Bin WANG, Si CHEN, Jiadong CHEN, Xing WANG

    Published 2021-02-01
    “…The resources of IoT devices are limited.Therefore, security, flexibility and lightweight cryptographic modules are required.The idea of white-box cryptography can meet the needs of IoT devices.In common AES white-box implementations, keys are bound to look up tables.So the look up tables must be changed when the keys are changed.It is not flexible enough in practical applications.To solve this problem, a dynamic white-box implementation method for AES, which was called DWB-AES, was proposed.By changing the boundary between rounds, all operations of the encryption and decryption process were performed by looking up the tables, and the tables and the keys were respectively confused, so that the entire encryption and decryption process did not expose the key information.The look up tables need not to be changed every time when the keys changed, which was more practical.The security analysis of DWB-AES shows that the DWB-AES has higher white-box diversity and ambiguous, it can resist BGE attack and Mulder attack.…”
    Get full text
    Article
  2. 1522

    Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext by LIU Yilong, XU Shengwei, YUE Ziyan

    Published 2024-08-01
    “…The security analysis proves that the proposed scheme satisfies the indistinguishability under chosen plaintext attack in the standard model, as well as the scheme’s hidden access policy and the generated outsourcing key can resist attribute value guessing attack. …”
    Get full text
    Article
  3. 1523

    Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice by Yiliang HAN, Kaiyang GUO, Riming WU, Kai LIU

    Published 2023-01-01
    “…In order to solve the key security problem in attribute-based encryption, a ciphertext policy attribute-based encryption scheme against key abuse was proposed based on the ring learning with error over ring and the access structure of ordered binary decision diagram.Firstly, two different institutions were constructed to jointly generate the user’s secret key, which reduced the risk of key disclosure by institutions.Secondly, the user’s specific information was embedded in each secret key to realize the traceability of the key, and the access of illegal users and malicious users were avoided by maintaining the white list.In addition, the access structure of ordered binary decision diagram was adopted by the proposed scheme, and the positive and negative values of attributes on the basis of supporting attribute AND, OR and Threshold operation were increased.Analysis shows that the proposed scheme meets the distinguishable security of anti-collusion attack and chosen-plaintext attack, reduces the storage and computing overhead, and it is more practical than other schemes.…”
    Get full text
    Article
  4. 1524

    Storage-Efficient 16-Bit Hybrid IP Traceback with Single Packet by Ming Hour Yang

    Published 2014-01-01
    “…Since adversaries may spoof their source IPs in the attacks, traceback schemes have been proposed to identify the attack source. …”
    Get full text
    Article
  5. 1525

    Quantum secure communication algorithm based on cyclic code and information compression by Hongyang MA, Xin ZHANG, Peng’ao XU, Fen LIU, Xingkui FAN

    Published 2020-03-01
    “…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
    Get full text
    Article
  6. 1526

    Research on security defense of mobile edge computing by Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI

    Published 2021-02-01
    “…Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.…”
    Get full text
    Article
  7. 1527

    Gulliver and the Gentle Reader by Claude RAWSON

    Published 2021-06-01
    “…In the first three books it conventionally attacks humans for what they do, but at the end of book III and throughout book IV humans are attacked for what they are. …”
    Get full text
    Article
  8. 1528

    Nonlinear Adaptive Equivalent Control Based on Interconnection Subsystems for Air-Breathing Hypersonic Vehicles by Chaofang Hu, Yanwen Liu

    Published 2013-01-01
    “…The reformulation of the altitude-flight-path angle dynamics and the attack angle-pitch rate dynamics is constructed into interconnection subsystems with input-to-state stability via small-gain theorem. …”
    Get full text
    Article
  9. 1529

    Survey on user authentication protocol in wireless sensor network by Wei-dong FANG, Wu-xiong ZHANG, Lian-hai SHAN, Wei HE, Wei CHEN

    Published 2017-01-01
    “…For the analysis of its security, the attack model was described, and the automated vali-dation of internet Security protocols and applications (AVISPA) and the high level protocols specification language (HLPSL) were overviewed in detail. …”
    Get full text
    Article
  10. 1530

    Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA

    Published 2014-11-01
    “…There is no doubt that mobile payment is the spotlight in Internet finance now.Although users can enjoy quick and convenient services,they have to face with more severe security problems at the same time:the attack incidents,such as cellphone Trojan and privacy leaks emerge endlessly.Lots of viruses which are designed for attacking financial payments can steal users’ personal information including account,password and verification code in the proceedings of remote payment and near field communication.Security issues have already seriously impeded the further development of the mobile payment market.To solve the above problems,discusses the security issues in mobile terminals,payments,network and interactive logic of banking business from financial institutions’ perspective was discussed systematically.In addition,current status of relevant security key technologies are summarized from academic research community and industry fields.Finally,based on related research achievements,the design of system architecture and suggestions for mobile payment security are proposed,which can guide the future development of commercial bank.…”
    Get full text
    Article
  11. 1531

    Sensor-Based Turmeric Finger Growth Characteristics Monitoring Using Embedded System under Soil by Maheswaran Shanmugam, Asokan Ramasamy

    Published 2014-06-01
    “…Purposely node II was left as such and node V was treated with Pseudomonas and viride to restrict the Rhizome rot disease attack. As a result, after cultivation, it was found that the Rhizome rot disease attack on node V is comparatively lesser than node II. …”
    Get full text
    Article
  12. 1532

    Video Multiple Watermarking Technique Based on Image Interlacing Using DWT by Mohamed M. Ibrahim, Neamat S. Abdel Kader, M. Zorkany

    Published 2014-01-01
    “…The robustness of this technique is tested by applying different types of attacks such as: geometric, noising, format-compression, and image-processing attacks. …”
    Get full text
    Article
  13. 1533

    A survey of cybersecurity for intelligent connected-automated vehicle by Yufeng LI, Xiaoyuan LU, Chenhong CAO, Jiangtao LI, Hongyi ZHU, Nan MENG

    Published 2020-04-01
    “…(Semi-) Autonomous vehicles use a new generation of information and communication technologies to realize a full range of interactions between vehicles and cloud,vehicles and vehicles,vehicles and roads,and vehicles and pedestrian,etc.When cars started to become connected computers on wheels,network security became a major challenge,and because the scope of cyber threats extended from virtual space to physical space,the harm of cybersecurity had risen to human life.The electronic/electrical structure,in-vehicle network structure,and out-of-vehicle network structure of intelligent vehicles were introduced,the security requirements of vehicle networks were elaborated,several cyber-attacks against connected-automated vehicle (CAV) were pointed out,the available defense measures against these attacks were addressed.The advantages and disadvantages of these measures were summarized.Finally,possible defense measures and directions in the future were discussed to further ensure the security of CAV.…”
    Get full text
    Article
  14. 1534

    Les Wayana de Guyane française sur les traces de leur histoire by Marie Fleury, Tasikale Alupki, Aimawale Opoya, Waiso Aloïké

    Published 2016-07-01
    “…Indeed, the migration took place in a context of war (ethnic and colonial), and attacks of aquatic monsters attacks symbolize the dangers of the river. …”
    Get full text
    Article
  15. 1535

    Lattice-based lightweight post quantum access authentication scheme for satellite network by WANG Shanshan, ZHAO Guofeng, XU Chuan, HAN Zhenzhen

    Published 2024-10-01
    “…Aiming at the problems of quantum computing attacks, high authentication overhead and long interaction time in satellite network access authentication schemes, a lightweight post quantum access authentication scheme based on lattice for a satellite network was proposed. …”
    Get full text
    Article
  16. 1536

    Self-embedding robust digital watermarking algorithm with perfectly blind detection by Tian-yu YE

    Published 2012-10-01
    “…Those existing robust watermarking algorithms couldn’t achieve perfectly blind detection.A robust watermarking algorithm with perfectly blind detection was proposed by introducing the self-embedding idea into robust watermarking literature.At first,the original image was split into non-overlapping blocks,and each block was transformed by DCT.The feature watermark was derived from judging the numerical relationship between each block’s DC coefficient and average of DC coefficients form all blocks.After encrypted by Logistic chaos sequence,the feature watermark was self-embedded into each block by adjusting two middle or low frequency DCT coefficients.Finally,the watermarked image was obtained after IDCT.The proposed algorithm achieved perfectly blind detection by combining self-embedding the encrypted feature watermark and blindly extracting authentication watermark.Experimental results show that the proposed algorithm has strong robustness to resist various attacks such as smoothing,adding noise,JPEG compression,resampling,cropping and geometric attacks like random row removal,downward shifting and right shifting.…”
    Get full text
    Article
  17. 1537

    Research on flood defense mechanism of SDN control layer:detection and mitigation by Qizhao ZHOU, Junqing YU, Dong LI

    Published 2021-11-01
    “…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
    Get full text
    Article
  18. 1538

    Synthesis of Organic Ligands via Reactions of 4-Benzoyl-5-phenylamino-2,3-dihydrothiophene-2,3-dione with N-Nucleophiles by Hassan Kabirifard, Pardis Hafez Taghva, Hossein Teimouri, Niloofar Koosheshi, Parastoo Javadpour, Hanieh Bagherinejad, Soheila Seyfi, Maryam Hossein Roodbari, Elaheh Golabian

    Published 2020-01-01
    “…These showed the nucleophilic attacks of N-nucleophiles, except primary aromatic amines, on thioester carboxyl group (C-2) of thiophene-2,3-dione ring 1. …”
    Get full text
    Article
  19. 1539

    ANTI-WEBSITE DEFACEMENT SYSTEM by Trần Đắc Tốt, Đặng Lê Nam, Phạm Nguyễn Huy Phương

    Published 2018-07-01
    “…Recently the impacts of hackers’ attacks which change the interface and content of Website are particularly serious. …”
    Get full text
    Article
  20. 1540

    May-Thurner Syndrome as a Rare Cause of Paradoxical Embolism in a Patient with Patent Foramen Ovale by Dominika M. Zoltowska, Guramrinder Thind, Yashwant Agrawal, Vishal Gupta, Jagadeesh Kumar Kalavakunta

    Published 2018-01-01
    “…Hence, May-Thurner syndrome was recognized as the probable source of paradoxical embolism causing transient ischemic attack in this patient.…”
    Get full text
    Article