Results 31 to 40 of about 13,174 (191)

State Variation Mining: On Information Divergence with Message Importance in Big Data

open access: yes, 2018
Information transfer which reveals the state variation of variables usually plays a vital role in big data analytics and processing. In fact, the measures for information transfer could reflect the system change by use of the variable distributions ...
Fan, Pingyi, Liu, Shanyun, She, Rui
core   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE

open access: yesIEEE Access, 2019
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE ...
Jung Hee Cheon   +3 more
doaj   +1 more source

FPGA based remote code integrity verification of programs in distributed embedded systems [PDF]

open access: yes, 2012
The explosive growth of networked embedded systems has made ubiquitous and pervasive computing a reality. However, there are still a number of new challenges to its widespread adoption that include scalability, availability, and, especially, security of ...
Basile, Cataldo   +2 more
core   +1 more source

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu   +3 more
doaj   +3 more sources

A framework for analyzing RFID distance bounding protocols [PDF]

open access: yes, 2010
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which leads to inaccurate analyzes and unfair comparisons. Motivated by this need, we
Avoine, Gildas   +6 more
core   +3 more sources

A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks

open access: yesIEEE Access
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN).
Manesh Thankappan   +2 more
doaj   +1 more source

Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem.
André Schrottenloher, Marc Stevens
doaj   +1 more source

Interoperability in the OpenDreamKit Project: The Math-in-the-Middle Approach

open access: yes, 2016
OpenDreamKit --- "Open Digital Research Environment Toolkit for the Advancement of Mathematics" --- is an H2020 EU Research Infrastructure project that aims at supporting, over the period 2015--2019, the ecosystem of open-source mathematical software ...
Dehaye, Paul-Olivier   +5 more
core   +3 more sources

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Home - About - Disclaimer - Privacy