fatty-streak 发表于 2025-3-28 15:17:18
,An Extension of Harn-Lin’s Cheater Detection and Identification,hares of a (. ′, .) secret sharing; while at the same time, maintain the original secret. Since . ′ < ., there are redundant shares. We also include discussion on how to select the new threshold . ′ in order to detect and identify cheaters successfully.或者发神韵 发表于 2025-3-28 21:09:07
Cryptanalysis on the User Authentication Scheme with Anonymity,smart card based authentication schemes. In this article, we show that their scheme cannot resist impersonation attack, denial-of-service attack and guessing attack. Furthermore, the scheme suffers high hash computation overhead and validations steps redundancy.aristocracy 发表于 2025-3-28 23:00:52
Design and Implementation of a Linux Kernel Based Intrusion Prevention System in Gigabit Network Usd implement an inkernel Intrusion Prevention System in Gigabit network using commodity hardware and Linux operating systems. Preliminary experiment results show that, our system outperforms traditional intrusion prevention system (snort inline) substantially. Besides, our system can reach the wire speed under a typical set of detection rules.单纯 发表于 2025-3-29 05:05:32
Performance Evaluation on Permission-Based Detection for Android Malware, show that a permission-based detector can detect more than 81% of malicious samples. However, due to its precision, we conclude that a permission-based mechanism can be used as a quick filter to identify malicious applications. It still requires a second pass to make complete analysis to a reported malicious application.GLUE 发表于 2025-3-29 09:56:37
Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme,nformation to be transmitted to the receiver through the secure channel. The experimental results demonstrated that the proposed scheme can achieve a higher hiding capacity and a lower distortion than Wang et al.’s scheme without transmitting any extra information.不如屎壳郎 发表于 2025-3-29 13:18:32
Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme,give their security proofs to support their claim. However, we find that their scheme is not as secure as the authors claimed. In this paper, we give comments on the paper of Choi et al. including the cryptanalysis of their scheme and the weakness of the security proof.磨碎 发表于 2025-3-29 17:39:33
Impact of Identifier-Locator Split Mechanism on DDoS Attacks,rnet and the identifier-locator split mapping network. In particular, the numerical analysis and simulation show that the identifier-locator split mapping network alleviates DDoS attacks more effectively, compared with the current Internet.有斑点 发表于 2025-3-29 23:08:35
Detecting Web-Based Botnets with Fast-Flux Domains, domains to identify a botnet either using HTTP as control and command channel or using fast-flux domain for cloaking. Based on the experiments on both testbed and real network environments, the results prove that the proposed method can effectively identify these botnets.某人 发表于 2025-3-30 03:48:41
Improvements of Attack-Defense Trees for Threat Analysis,ermeasures associated with each of attack path. Defense evaluation metrics for each node for probabilistic analysis is used to assisting defender simulate the attack results. Finally, a case of threat analysis of typical cyber security attack is given to demonstrate our approach.粘连 发表于 2025-3-30 07:31:04
2190-3018held December 12-14, 2012 in Hualien, Taiwan.Written by exp. .The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from m