Fault Template Attack Based on Fault Probability
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj +1 more source
Information Security management: A human challenge? [PDF]
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core +1 more source
Low-rate Denial of Service attack detection method based on time-frequency characteristics
In this paper, a real cloud computing platform-oriented Low-rate Denial of Service (LDoS) attack detection method based on time-frequency characteristics of traffic data is proposed.
Yu Fu, Xueyuan Duan, Kun Wang, Bin Li
doaj +1 more source
VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability
Micropayments are one of the challenges in cryptocurrencies. Micropayments on the blockchain have the problem that the fee is high for the transfer amount.
Taisei Takahashi+2 more
doaj +1 more source
On the Performance Analysis for CSIDH-Based Cryptosystems
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo+3 more
doaj +1 more source
AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis
Risk analysis (RA) contains several methodologies that object to ensure the protection and safety of occupational stakeholders. Multi attribute decision-making (MADM) is one of the most important RA methodologies that is applied to several areas from ...
M. Fatih Ak, Muhammet Gul
semanticscholar +1 more source
Information Warfare, Threats and Information Security
The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security.
M. A. Kazakov, D. N. Bespalov
openaire +6 more sources
SCDIS-210 Information Security Technology Coverage Measurement Standards [PDF]
These standards establish a simplified and consistent measurement for coverage of each of the security technologies listed therein. These standards are to be used for all South Carolina state agencies, including institutions, departments, divisions ...
Division of Information Security, Division of Technology State of South Carolina – Information Security Program
core
MKTN: Adversarial-Based Multifarious Knowledge Transfer Network from Complementary Teachers
With the demands for light deep networks models in various front-end devices, network compression has attracted increasing interest for reducing model sizes yet without sacrificing much model accuracy.
Xiaobing Zhang+3 more
doaj +1 more source
On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations [PDF]
A number of determinants predict the adoption of Information Systems (IS) security innovations. Amongst, perceived vulnerability of IS security threats has been examined in a number of past explorations. In this research, we examined the processes pursued in analysing the relationship between perceived vulnerability of IS security threats and the ...
arxiv +1 more source