嘲弄 发表于 2025-3-23 10:26:18
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesisdiffusion properties can be increased with the increase of the size of neighborhood radius of the CA cell. In this work, we study a class of 5-neighborhood null boundary linear CA. We present an algorithm for synthesizing 5-neighborhood linear CA from its characteristic polynomial by assuming that some of the CA sub-polynomials are available.黄油没有 发表于 2025-3-23 14:43:56
http://reply.papertrans.cn/63/6269/626822/626822_12.pngMeditative 发表于 2025-3-23 18:24:56
http://reply.papertrans.cn/63/6269/626822/626822_13.pnggrovel 发表于 2025-3-24 00:39:59
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme which is indexed by important or related keyword(s) available in the data. Once the data is stored, the client supplies some keywords to the cloud server and requests the corresponding data. If the data is stored in plaintext form, data privacy will be violated. Thus the client encrypts the data alOffset 发表于 2025-3-24 03:02:22
On the Security of a Searchable Anonymous Attribute Based Encryptioniated with secret key and the access policy connected with ciphertext matches. Although CP-ABE provides both confidentiality and fine-grained access control to the data stored in public cloud, anonymous CP-ABE adds interesting feature of sender and/or receiver anonymity. In this paper, we discuss a描述 发表于 2025-3-24 07:03:01
Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”n scheme to access remote server over insecure channels. They also claimed that their scheme is able to resist various attacks. However, in this paper we demonstrate that Kumar et al. scheme is still vulnerable to various malicious attacks and is aslo unable to provide several essential security pro轻而薄 发表于 2025-3-24 13:31:06
Design of Secure and Efficient Electronic Payment System for Mobile Usersfacilitate users, hand held devices such as a mobile phone application for the payment method should be accepted for practical implementation. Recently, Yang et al. proposed an electronic payment protocol using payment gateway and claims that this scheme is suitable for cloud computing, where paymenforbid 发表于 2025-3-24 16:29:57
A Deep Learning Based Artificial Neural Network Approach for Intrusion Detectiont may reduce the utility of any network or systems. Constantly changing and the complicated nature of intrusion activities on computer networks cannot be dealt with IDSs that are currently operational. Identifying and preventing such attacks is one of the most challenging tasks. Deep Learning is one连接 发表于 2025-3-24 22:29:46
A Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic Attacksriable Boolean function against fast algebraic attacks, one may need to compute the ranks of a series of matrices of size . over binary field . for each positive integer . less than . and corresponding .. In this paper, for an .-variable balanced Boolean function, exploiting the combinatorial proper单挑 发表于 2025-3-25 00:58:26
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis error-correcting codes, test pattern generation, cryptography etc. Most of these applications use 3-neighborhood one dimensional CA. Cellular automata have been chosen as a better crypto-primitives for providing very good pseudorandom sequences and their high diffusion property. The randomness and