-
1841
Agroterrorism in the U.S.: An Overview
Published 2005-10-01“… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. …”
Get full text
Article -
1842
L’ennemi dans l’après-guerre espagnole, 1939-1945
Published 2017-12-01“…Surprisingly, the enemies that were actually hit by the bloodiest repression –the “reds”– were not always those who received the worst attacks in propaganda. Finally, an interpretation of the functions played by the enemy’s representation within the Francoist system is proposed.…”
Get full text
Article -
1843
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01“…Abstract We present practical attacks on IAR-CTR and IAR-CFB, AE modes proposed by Hwang and Gope to offer both privacy and authenticity in a single pass. …”
Get full text
Article -
1844
Redbay Ambrosia Beetle-Laurel Wilt Pathogen: A Potential Major Problem for the Florida Avocado Industry
Published 2008-02-01“…Osborne, describes this insect-fungal pest attacking woody plants in the laurel family, including avocado. …”
Get full text
Article -
1845
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes
Published 2025-01-01“…Simulations conducted on an arbitrary selection of images from a database demonstrate that our system can withstand all known attacks.…”
Get full text
Article -
1846
Analysis and thought on quantum insert technology
Published 2017-08-01“…Quantum insert (QI) is a technology that makes redirection attacks by injecting malicious content into certain sessions.A brief introduction of American “Quantum Insert” project was given and the connotation of this technology was discussed.It then looked into the application that quantum insert was put to in the Internet “Great Cannon” event.An open source QI tool made available by Fox IT,an IT security company,was then analyzed.An experimental verification environment was built using this tool and a verification was made.Finally,a thought was given on how to put QI to use in building network defense.…”
Get full text
Article -
1847
Research on dynamic array honeypot for collaborative network defense strategy
Published 2012-11-01“…Inspired by the ancient battle diagram for military purpose,a concept of dynamic array honeypot was proposed to bewilder the attackers by coordinating and changing the role pseudo-randomly as a huge dynamic puzzle.The dynamic array honeypot model was presented,system simulation through NS2 was performed,and the prototype implementation with Java was carried out.Detailed empirical studies were launched upon both the simulation model and the prototype.The simulation results demonstrates that the dynamic array honeypot system is feasible and effective for active network confrontation.…”
Get full text
Article -
1848
Agroterrorism in the U.S.: An Overview
Published 2005-10-01“… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. …”
Get full text
Article -
1849
Improvement and formal proof on protocol Otway-Rees
Published 2012-09-01“…Choosing the authentication key distribution protocol Otway-Rees as the research object,using protocol composition logic (PCL) as proof tool,the security protocol analysis and formal proof was studied.Firstly,this paper gave the forms of security attack,analyzed the Otway-Rees defects and put forward the amended protocol (named as AOR protocol).Then,PCL was extended.And then PCL was used to describe and prove the behavior of each entity and the safety of the protocol attribute formally.Finally,the conclusion was given that the amended AOR protocol has the security attribute of key confidentiality.…”
Get full text
Article -
1850
Provable secure trusted protocol for network storage
Published 2011-01-01“…A provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction,which would improve the efficiency of the protocol,and prevent the server from malicious attacks effectively.The analysis results show that the protocol is SK-secure by using CK model,which would increase the data confidentiality,integrity and no repudiation.…”
Get full text
Article -
1851
Secure network coding scheme for scalable video streaming
Published 2013-05-01“…With the purpose to achieve hierarchical security levels for scalable video streaming in heterogeneous net-works,random function was used to randomize parts of the video streaming in each layer.Network coding scheme was also used to resist known-plaintext attacks.Moreover,network encoder was studied.Ordered random linear network en-coder was designed for scalable video transmission.It could achieve scalability in security levels with few random opera-tions and reduce communication overhead.Analysis shows that the scheme could effectively increase the network throughput.…”
Get full text
Article -
1852
Detection of T91 Steel Corrosion with a Fe3+-Enhanced Fluorescence Probe
Published 2015-01-01“…The varying of fluorescence intensity is linked to that of weight-loss of T91 steel. Early attack on T91 steel was detected using fluorescence microscopy. …”
Get full text
Article -
1853
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01“…A workable and efficient data link layer security protocol had been proposed on the need of safety information transfer requirements of the TES system.The protocol provides a software registration solution for the remote sites and a information encryption method base on the elliptic curves cryptography(ECC) algorithm as well as a combined key allocation method.The protocol takes the characters of the TES system into account,improves its ability to identify remote sites,and provides ways to prevent information stealing and network attacks.…”
Get full text
Article -
1854
Application progress of SGX in trusted computing area
Published 2021-12-01“…The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX were introduced, the research status of SGX in the field of trusted computing were analyzed.Then, sorted out the current application difficulties and solutions of SGX were sorted out and compared with other trusted computing technologies.Finally, SGX technology development direction in the field of trusted computing was discussed.…”
Get full text
Article -
1855
L’ennemi dans l’après-guerre espagnole, 1939-1945
Published 2018-07-01“…Surprisingly, the enemies that were actually hit by the bloodiest repression –the “reds”– were not always those who received the worst attacks in propaganda. Finally, an interpretation of the functions played by the enemy’s representation within the Francoist system is proposed.…”
Get full text
Article -
1856
Finding Galictis cuja (Molina, 1782) (Carnivora, Mustelidae) at a northern Chilean site in the potential distribution area of the species
Published 2025-01-01“…We present the first finding of Galictis cuja in the northern desert of Tarapaca region, Chile, apparently attacked and killed by dogs, which indicates an expansion of its distribution range and the utilization of microhabitats.…”
Get full text
Article -
1857
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Published 2011-01-01“…Aiming at the security of authentication protocol for heterogeneous wireless network,a mutual authentication and key agreement protocol,which was based on CPK algorithm and improved ECDH algorithm,was proposed.The temporary authentication identity and temporary communication identity was adopted to realize user identity anonymity.The ordered pair of temporary communication identity was proposed to prevent replay attack in the process of re-authentication.The risk of key compromise was also avoided in the proposed protocol.By security analysis,this protocol had the security properties such as identity authentication,key security and anonymity.…”
Get full text
Article -
1858
Agroterrorism in the U.S.: An Overview
Published 2009-06-01“…Archer, discusses the use of biological agents in a deliberate, harmful attack, or terrorism using the weapons of biological warfare against the U.S. agricultural and food processing system. …”
Get full text
Article -
1859
Robust image hiding algorithm for secure multimodal biometrics
Published 2016-09-01“…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
Get full text
Article -
1860
Agroterrorism in the U.S.: An Overview
Published 2009-06-01“…Archer, discusses the use of biological agents in a deliberate, harmful attack, or terrorism using the weapons of biological warfare against the U.S. agricultural and food processing system. …”
Get full text
Article