標題: Titlebook: Applied Cryptography in Computer and Communications; Second EAI Internati Jingqiang Lin,Qiang Tang Conference proceedings 2022 ICST Institu [打印本頁] 作者: 作業(yè) 時間: 2025-3-21 16:31
書目名稱Applied Cryptography in Computer and Communications影響因子(影響力)
書目名稱Applied Cryptography in Computer and Communications影響因子(影響力)學科排名
書目名稱Applied Cryptography in Computer and Communications網(wǎng)絡公開度
書目名稱Applied Cryptography in Computer and Communications網(wǎng)絡公開度學科排名
書目名稱Applied Cryptography in Computer and Communications被引頻次
書目名稱Applied Cryptography in Computer and Communications被引頻次學科排名
書目名稱Applied Cryptography in Computer and Communications年度引用
書目名稱Applied Cryptography in Computer and Communications年度引用學科排名
書目名稱Applied Cryptography in Computer and Communications讀者反饋
書目名稱Applied Cryptography in Computer and Communications讀者反饋學科排名
作者: 愚蠢人 時間: 2025-3-21 22:16
Quantum-Safe Signing of?Notification Messages in?Intelligent Transport Systemsn intelligent transport systems. We evaluated the performance of the algorithms by measuring the time required to sign and verify messages, as well as the size of the signed messages, and compared the quantum-safe options to the elliptic curves currently accepted by the standards. Our results show t作者: 誘惑 時間: 2025-3-22 01:46
WB-GWS: An IoT-Oriented Lightweight Gateway System Based on?White-Box Cryptographytions attract more and more attentions. Secure data transmission plays pivotal role of the security of IoT applications. However, there are still many IoT devices do not support cryptographic functions due to their constrained resources. Moreover, cryptographic key storage also becomes a practical s作者: 收集 時間: 2025-3-22 05:18
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Envdynamic power adjustments. However, security and privacy challenges are serious issues in smart grid environment due to a myriad of heterogeneous appliances that interconnect with the grid system. Consequently, many security and privacy preservation schemes have been developed based on techniques su作者: 條約 時間: 2025-3-22 09:02
Resource Consumption Evaluation of?C++ Cryptographic Libraries on?Resource-Constrained Devicesl configuration of these resource-constrained devices. Moreover, in certain scenarios security must be guaranteed to protect data confidentiality, which imposes another resource consumption overhead. In this work-in-progress we evaluate the resource consumption of two widely-used block ciphers (AES 作者: 萬花筒 時間: 2025-3-22 16:18 作者: 軟弱 時間: 2025-3-22 17:42
bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for?IoT Nodess paper, our contribution consists in proposing a new authentication protocol, named bisAUTH, for IoT objects inspired on certain characteristics of the blockchain technology. Our main objective is to propose a mechanism allowing neighboring IoT nodes of a network to authenticate in a decentralized 作者: Substance 時間: 2025-3-22 23:27 作者: expdient 時間: 2025-3-23 04:20
The Block-Based Mobile PDE Systems are Not Secure - Experimental Attackstion (FDE) is often integrated in mainstream mobile operating systems like Android and iOS. FDE however cannot defend against coercive attacks in which the adversary can force the device owner to disclose the decryption key. To combat the coercive attacks, Plausibly Deniable Encryption (PDE) is leve作者: 符合規(guī)定 時間: 2025-3-23 06:18
Black-Box Testing of?Cryptographic Algorithms Based on?Data Characteristics past decades, cryptanalysts have proved that many once prevailing cryptographic algorithms (e.g., MD4, MD5, 3DES, RC4) are no longer secure now. However, insecure cryptographic algorithms are still widely deployed in practice, seriously endangering the security of cyberspace. The reasons for this d作者: 燒烤 時間: 2025-3-23 10:04 作者: 泥沼 時間: 2025-3-23 15:26
Semi-supervised False Data Injection Attacks Detection in Smart Grid subjectivity, relying on expert knowledge and time-consuming nature of power system sample annotation, this task is intrinsically a small sample learning problem. In this paper, we propose a novel semi-supervised detection algorithm for FDIAs detection. The semi-supervised label propagation algorit作者: Juvenile 時間: 2025-3-23 21:26 作者: 玉米 時間: 2025-3-24 00:09 作者: landfill 時間: 2025-3-24 05:46 作者: 僵硬 時間: 2025-3-24 10:30
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/a/image/159758.jpg作者: 磨坊 時間: 2025-3-24 14:40 作者: 開頭 時間: 2025-3-24 15:43
https://doi.org/10.1007/978-3-319-30157-0m unusable in the near future. In view of this, the National Institute of Standards and Technology (NIST) is currently undertaking the standardization of post-quantum Key Encapsulation Mechanisms (KEM) such that they can withstand quantum-capable attackers. One potential standardization candidate (i作者: institute 時間: 2025-3-24 22:31 作者: 蟄伏 時間: 2025-3-25 01:28 作者: notification 時間: 2025-3-25 03:33
English Language Training in the Workplacedynamic power adjustments. However, security and privacy challenges are serious issues in smart grid environment due to a myriad of heterogeneous appliances that interconnect with the grid system. Consequently, many security and privacy preservation schemes have been developed based on techniques su作者: 箴言 時間: 2025-3-25 07:43
Christine Coombe,Lana Hiasat,Georgia Daleurel configuration of these resource-constrained devices. Moreover, in certain scenarios security must be guaranteed to protect data confidentiality, which imposes another resource consumption overhead. In this work-in-progress we evaluate the resource consumption of two widely-used block ciphers (AES 作者: Plaque 時間: 2025-3-25 14:46 作者: 喃喃訴苦 時間: 2025-3-25 16:19 作者: peritonitis 時間: 2025-3-25 20:56 作者: lavish 時間: 2025-3-26 02:36
https://doi.org/10.1007/978-3-663-16013-7tion (FDE) is often integrated in mainstream mobile operating systems like Android and iOS. FDE however cannot defend against coercive attacks in which the adversary can force the device owner to disclose the decryption key. To combat the coercive attacks, Plausibly Deniable Encryption (PDE) is leve作者: Bumble 時間: 2025-3-26 05:57
https://doi.org/10.1007/978-3-663-16013-7 past decades, cryptanalysts have proved that many once prevailing cryptographic algorithms (e.g., MD4, MD5, 3DES, RC4) are no longer secure now. However, insecure cryptographic algorithms are still widely deployed in practice, seriously endangering the security of cyberspace. The reasons for this d作者: 的事物 時間: 2025-3-26 11:27 作者: infantile 時間: 2025-3-26 13:09 作者: 憤怒歷史 時間: 2025-3-26 17:21
Benjamin L. Moorhouse,Kevin M. Wongreal-time information sharing. While digitization improves quality, reduces prices, and boosts efficiency in logistics, it also introduces new security risks. A combination of traditional security protection systems, network security borders collapsing and increased risks from both sides. An investi作者: 杠桿支點 時間: 2025-3-26 23:32 作者: 下垂 時間: 2025-3-27 04:49 作者: contrast-medium 時間: 2025-3-27 05:25 作者: Osteoporosis 時間: 2025-3-27 13:29
https://doi.org/10.1007/978-3-319-30157-0nges to performance. The results also provide an evaluation of three quantum-safe digital signature algorithms’ suitability for this purpose, thus helping to choose suitable algorithms when migrating intelligent transport systems towards quantum resistance.作者: Frequency 時間: 2025-3-27 14:01 作者: 大方不好 時間: 2025-3-27 18:22
bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for?IoT Nodesand secure way. Evaluation of our proposed protocol against several criteria, its resistance to various attacks and its comparison with recent protocols, show that it brings significant improvements compared to the existing ones.作者: 朋黨派系 時間: 2025-3-28 01:09 作者: Mingle 時間: 2025-3-28 04:05
https://doi.org/10.1007/978-3-319-30157-0t a dataset for benchmarking the performance of various instantiations of decoders that may be proposed by the wider research community in future. To the best of our knowledge, no other dataset exists for researchers to benchmark their decoders for QC-MDPC-based cryptosystems.作者: Restenosis 時間: 2025-3-28 09:27
English Language Training in the Workplace in the white-box security context. The performance of WB-GWS is analyzed amongst different platforms. The experiment results support that WB-GWS can meet the security requirements of IoT applications with low-rate data transmission.作者: Etymology 時間: 2025-3-28 14:20
Christine Coombe,Lana Hiasat,Georgia Daleurememory consumption is similar across both libraries and algorithms. In terms of CPU, . outperforms ., with ChaCha20 achieving the best performance rates. Regarding the type of input data, no major impact has been noticed.作者: 傷心 時間: 2025-3-28 16:03
Semantics: Word and sentence meaning,ion, we built a testbed with IoT devices for evaluation..The traffic generated in the testbed was captured for evaluation. The result of the experiment indicates that by incorporating destination and interval features, our method can accurately classify IoT and non-IoT devices and achieves the accuracy over 99%.作者: abnegate 時間: 2025-3-28 21:57 作者: 免除責任 時間: 2025-3-28 23:18 作者: 協(xié)議 時間: 2025-3-29 05:24
WB-GWS: An IoT-Oriented Lightweight Gateway System Based on?White-Box Cryptography in the white-box security context. The performance of WB-GWS is analyzed amongst different platforms. The experiment results support that WB-GWS can meet the security requirements of IoT applications with low-rate data transmission.作者: 中古 時間: 2025-3-29 08:59
Resource Consumption Evaluation of?C++ Cryptographic Libraries on?Resource-Constrained Devicesmemory consumption is similar across both libraries and algorithms. In terms of CPU, . outperforms ., with ChaCha20 achieving the best performance rates. Regarding the type of input data, no major impact has been noticed.作者: 放縱 時間: 2025-3-29 13:14
IoT Devices Classification Base on?Network Behavior Analysision, we built a testbed with IoT devices for evaluation..The traffic generated in the testbed was captured for evaluation. The result of the experiment indicates that by incorporating destination and interval features, our method can accurately classify IoT and non-IoT devices and achieves the accuracy over 99%.作者: Lignans 時間: 2025-3-29 16:30 作者: climax 時間: 2025-3-29 19:51 作者: magnanimity 時間: 2025-3-30 02:03
Applied Cryptography in Computer and CommunicationsSecond EAI Internati作者: 我們的面粉 時間: 2025-3-30 07:07 作者: BACLE 時間: 2025-3-30 09:17 作者: 諄諄教誨 時間: 2025-3-30 13:00
X-FTPC: A Fine-Grained Trust Propagation Control Scheme for?Cross-Certification Utilizing Certificat certificates and improve the accountability of CAs, by recording all certificates in publicly-visible logs. In this paper, we propose ., a fine-grained trust propagation control enhancement scheme for cross-certification based on the idea of transparency, combined with the publicly-accessible, audi作者: Petechiae 時間: 2025-3-30 17:45 作者: Anticonvulsants 時間: 2025-3-30 23:30
Black-Box Testing of?Cryptographic Algorithms Based on?Data Characteristics In this paper, we propose a method of static black-box testing of cryptographic algorithms, which can identify a specific algorithm based on the corresponding data characteristics. We have implemented the testing method and used it to check 150 binaries of three types, including cryptographic libra