AVOW 发表于 2025-3-30 10:04:23
On the Security of TRNGs Based on Multiple Ring Oscillatorsan entropy estimation method to analyze the security of MRO-TRNG based on the method for oscillator-based TRNG, and calculates a lower bound of entropy. The theoretical results are verified through Matlab simulations and FPGA experiments. The conclusions can further guide the setting of design param扩大 发表于 2025-3-30 14:26:36
Target Information Trading - An Economic Perspective of Security attackers is analyzed in a Stackelberg game. Both the attackers’ competitive equilibrium solutions and data broker’s optimal pricing strategy are obtained. Our results show that with information trading, the target suffers from larger risks even when the information price is too high to benefit theCANDY 发表于 2025-3-30 17:09:28
http://reply.papertrans.cn/87/8635/863495/863495_53.png搜集 发表于 2025-3-30 22:03:14
The Disbanding Attack: Exploiting Human-in-the-Loop Control in Vehicular Platooningized mitigation approach. Due to scalability, security, and privacy concerns, such an approach may not be practical in reality. Hence, we also propose a decentralized mitigation algorithm that reduces excessive speed changes and coordinates inter-platoon behaviors to minimize the attack impacts. Our1FAWN 发表于 2025-3-31 03:33:38
http://reply.papertrans.cn/87/8635/863495/863495_55.png宣称 发表于 2025-3-31 08:59:23
http://reply.papertrans.cn/87/8635/863495/863495_56.pngThyroid-Gland 发表于 2025-3-31 11:06:28
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of utation performance of reusable fuzzy extractors. Based on statistical analysis of the block error distribution of iris trait, we propose an iris-code preprocessing method which uses Hadamard code to lower error tolerance. We conduct an experiment on a public iris dataset and experimental result sho