Ordeal 发表于 2025-3-26 21:26:37
On the Security of TRNGs Based on Multiple Ring Oscillatorsty protocols. The quality of generated sequences would directly influence the security of the cryptographic application. Furthermore, in order to enhance the generation rate of random numbers, a TRNG based on multiple ring oscillators (ROs), i.e., MRO-TRNG for short, has been proposed by Sunar . The壕沟 发表于 2025-3-27 04:05:24
Secrecy on a Gaussian Relay-Eavesdropper Channel with a Trusted Relaydropping, which leads to that the physical layer security (information theoretic secrecy) is becoming attractive due to its relying on the characteristics of the transmission medium. In this paper, we study the secrecy on a gaussian relay-eavesdropper channel with a trusted relay, which is assumed t流动才波动 发表于 2025-3-27 08:32:33
Target Information Trading - An Economic Perspective of Securityation capabilities to obtain target information, few work considers the possibility that the information can be acquired from a data broker, not to mention exploring the profit-seeking behaviors of such an information service in the shrouded underground society. This paper studies the role of inform清唱剧 发表于 2025-3-27 10:42:04
http://reply.papertrans.cn/87/8635/863495/863495_34.png橡子 发表于 2025-3-27 15:34:00
The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooningindustry alike, as they can produce safe driving, regularize traffic flow, and increase throughput. Research has demonstrated, however, that when platoons are placed in an adversarial environment, they are vulnerable to a variety of attacks that could negatively impact traffic flow and produce collidelusion 发表于 2025-3-27 19:54:17
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Pge. However, secure sharing of data via cloud remains an essential issue since the cloud service provider is untrusted. Fortunately, asymmetric-key encryption, such as identity-based encryption (IBE) and attribute-based encryption (ABE), provides a promising tool to offer data confidentiality and ha火光在摇曳 发表于 2025-3-27 23:30:44
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework time and gather information about the adversaries’ strategies, tactics, capabilities, and intent. The key challenge in this cyber deception approach is the design and placement of network decoys to ensure maximal information uncertainty for the attackers. State-of-the-art approaches to address thisGlossy 发表于 2025-3-28 04:26:36
SEVGuard: Protecting User Mode Applications Using Secure Encrypted Virtualizationrily designed for the protection of VMs, we found a way to overcome this limitation and exclusively protect user mode applications. Therefore, we migrate the application into a hardware-accelerated VM and encrypt both its memory and register state. To avoid the overhead of a typical hypervisor, we b易于 发表于 2025-3-28 06:20:14
A Behavior-Aware Profiling of Smart Contracts contracts emerge as the promising blockchain application, which could enable distrustful parties to participate in the automatic and trustful transactions. Given the increasing importance of Ethereum smart contracts, understanding them becomes imperative. However, prior work only studied smart contexhilaration 发表于 2025-3-28 14:23:15
http://reply.papertrans.cn/87/8635/863495/863495_40.png