Showing 141 - 160 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 141
  2. 142

    Hybrid-structured onion scheme against replay attack of MIX by SHI Jin-qiao, FANG Bin-xing, GUO Li, WANG Li-hong

    Published 2009-01-01
    “…Replay attack against MIX was studied and a hybrid-structured onion scheme of MIX against replay attack was proposed.In hybrid scheme, probabilistic encryption and semantic security of universal re-encryption were utilized to protect MIX against replay attack, and the authentication property of layered encryption was utilized to protect integrity of messages.Meanwhile, symmetric encryption was imported to improve efficiency.Analysis shows that the hybrid-structured onion scheme can resist replay attack with guarantee of security and efficiency.…”
    Get full text
    Article
  3. 143

    Detecting and Defending against Replication Attacks in Wireless Sensor Networks by Xiang-yi Chen, Li-xia Meng, Yong-zhao Zhan

    Published 2013-06-01
    “…Wireless sensor networks are susceptible to node replication attacks due to their unattended nature. Existing replicas detection schemes can be further improved in regard of detection probabilities, detection overheads, and the balance of detection overheads among sensor nodes. …”
    Get full text
    Article
  4. 144
  5. 145

    Multi-point joint power analysis attack against AES by Zhi-bo DU, UNYuan-hua S, ANGYi W

    Published 2016-10-01
    Subjects: “…multi-point joint power analysis attack…”
    Get full text
    Article
  6. 146

    Construction of DDoS attacks malicious behavior knowledge base construction by Feiyang LIU, Kun LI, Fei SONG, Huachun ZHOU

    Published 2021-11-01
    “…Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed based on the knowledge graph, and contains two parts: a malicious traffic detection database and a network security knowledge base.The malicious traffic detection database detects and classifies malicious traffic caused by DDoS attacks, the network security knowledge base detects DDoS attacks from traffic characteristics and attack frameworks model malicious behaviors, and perform inference, tracing and feedback on malicious behaviors.On this basis, a distributed knowledge base was built based on the DDoS open threat signaling (DOTS) protocol to realize the functions of data transmission between distributed nodes, DDoS attack defense, and malicious traffic mitigation.The experimental results show that the DDoS attack malicious behavior knowledge base can effectively detect and mitigate the malicious traffic caused by DDoS attacks at multiple gateways, and has the knowledge update and reasoning function between the distributed knowledge bases, showing good scalability.…”
    Get full text
    Article
  7. 147
  8. 148
  9. 149

    Round reduction-based fault attack on SM4 algorithm by Min WANG, Zhen WU, Jin-tao RAO, Hang LING

    Published 2016-10-01
    “…A novel method of fault attack based on round reduction against SM4 algorithm was proposed.Faults were in-jected into the last four rounds of the SM4 encryption algorithm,so that the number of the algorithm's rounds can be re-duced.In known-ciphertext scenario,four traces are enough to recover the total 128 bit master key by screening these faults easily.The proposed attack is made to an unprotected SM4 smart card.Experiment shows that this attack method is efficient,and which not only simplifies the existing differential fault attack,but also improves the feasibility of the attack.…”
    Get full text
    Article
  10. 150
  11. 151
  12. 152
  13. 153

    Approach of detecting LDoS attack based on time window statistic by WU Zhi-jun, ZENG Hua-long, YUE Meng

    Published 2010-01-01
    “…Through analysised of normal traffic and attack flow,statistic result showed that the normal traffic throughout had an obviously degrade and attack flow had a short time abnormity pulse with higher amplitude.An approach of de-tecting LDoS attack based on time window statistic was presented.Experiments on different length of sample time were conducted in a test environment established on simulation network.Test results show that the detection probability is more than 96%,false negative and false positive are less than 3%.…”
    Get full text
    Article
  14. 154

    Acute Attack of Pseudogout with the Wide Lesion in Lumbar Spondylolytic Spondylolisthesis by Hironari Kaneyama, Yuichiro Morishita, Osamu Kawano, Takuaki Yamamoto, Takeshi Maeda

    Published 2020-01-01
    “…To report a rare case of an acute attack of calcium pyrophosphate dihydrate (CPPD) deposition disease in a patient with lumbar spondylolytic spondylolisthesis, which demonstrated widespread lesion with neurological deficit. …”
    Get full text
    Article
  15. 155

    Related-key rectangle attack on the full ARIRANG encryption mode by ZHANG Peng1, LI Rui-lin1, LI Chao1

    Published 2011-01-01
    Subjects: “…related-key rectangle attack…”
    Get full text
    Article
  16. 156

    Survey on SSDF attack and defense for distributed cooperative cognitive radio by Guangyue LU, Hang SU

    Published 2017-01-01
    “…Cooperative spectrum sensing (CSS) improves the reliability of spectrum sensing,however,it is susceptible to spectrum sensing data falsification (SSDF) due to the fusion mechanism.To insight into the current research and development trend of defense strategy against the SSDF attack,several typical distributed strategies were concluded and the types of distributed algorithms were analyzed in several aspects.Finally,the future research of SSDF distributed defense strategy was prospected based on the problems found in the current research.…”
    Get full text
    Article
  17. 157
  18. 158

    WSN key recovery attack based on symmetric matrix decomposition by Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG

    Published 2018-10-01
    “…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
    Get full text
    Article
  19. 159

    Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks by Yugo Iori, Hideaki Ishii

    Published 2024-01-01
    “…Two extensions of this algorithm are further presented, which can operate under more adversarial attacks and also with relaxed conditions on the initial phases. …”
    Get full text
    Article
  20. 160