AVOW
发表于 2025-3-30 10:04:23
On the Security of TRNGs Based on Multiple Ring Oscillatorsan entropy estimation method to analyze the security of MRO-TRNG based on the method for oscillator-based TRNG, and calculates a lower bound of entropy. The theoretical results are verified through Matlab simulations and FPGA experiments. The conclusions can further guide the setting of design param
扩大
发表于 2025-3-30 14:26:36
Target Information Trading - An Economic Perspective of Security attackers is analyzed in a Stackelberg game. Both the attackers’ competitive equilibrium solutions and data broker’s optimal pricing strategy are obtained. Our results show that with information trading, the target suffers from larger risks even when the information price is too high to benefit the
CANDY
发表于 2025-3-30 17:09:28
http://reply.papertrans.cn/87/8635/863495/863495_53.png
搜集
发表于 2025-3-30 22:03:14
The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooningized mitigation approach. Due to scalability, security, and privacy concerns, such an approach may not be practical in reality. Hence, we also propose a decentralized mitigation algorithm that reduces excessive speed changes and coordinates inter-platoon behaviors to minimize the attack impacts. Our
1FAWN
发表于 2025-3-31 03:33:38
http://reply.papertrans.cn/87/8635/863495/863495_55.png
宣称
发表于 2025-3-31 08:59:23
http://reply.papertrans.cn/87/8635/863495/863495_56.png
Thyroid-Gland
发表于 2025-3-31 11:06:28
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of utation performance of reusable fuzzy extractors. Based on statistical analysis of the block error distribution of iris trait, we propose an iris-code preprocessing method which uses Hadamard code to lower error tolerance. We conduct an experiment on a public iris dataset and experimental result sho