Results 1 to 10 of about 144,734 (270)
An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning
Much research on adversarial attacks has proved that deep neural networks have certain security vulnerabilities. Among potential attacks, black-box adversarial attacks are considered the most realistic based on the the natural hidden nature of deep ...
Zhiyu Chen +7 more
doaj +1 more source
HPoC: A Lightweight Blockchain Consensus Design for the IoT
The research topics of this paper are the data security of the edge devices and terminals of the Internet of Things (IoT) and the consensus design of a lightweight blockchain for the Internet of Things.
Zixiang Nie, Maosheng Zhang, Yueming Lu
doaj +1 more source
In order to improve the ability of the new energy Internet to defend against external attacks, the author proposes a dual Markov chain-based FDIA detection method suitable for the new energy Internet.
Shengda Wang +4 more
doaj +1 more source
THE GENERATING RANDOM SEQUENCES WITH THE INCREASED CRYPTOGRAPHIC STRENGTH
Random sequences are used in various applications in construction of cryptographic systems or formations of noise-type signals. For these tasks there is used the program generator of random sequences which is the determined device. Such a generator, as a
Volodymyr Korchynskyi +3 more
doaj +1 more source
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
At ASIACRYPT 2019, Zhang proposed a near collision attack on A5/1 claiming to recover the 64‐bit A5/1 state with a time complexity around 232 cipher ticks with negligible memory requirements.
Yanbin Xu, Yonglin Hao, Mingxing Wang
doaj +1 more source
Null‐space beamforming strategy for secrecy rate balancing of two‐way MIMO relay networks
Here, the issue of physical layer security in a two‐way multi‐antenna relay network) is studied. In such a network, two multi‐antenna transceivers attempt to exchange their secret messages via a multi‐antenna relay node in the presence of an eavesdropper.
Samad Fazeli, Soroush Akhlaghi
doaj +1 more source
Blockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision
Building trust relationships between different decentralized entities in the IoT ecosystem is essential. Hereof, the combination of blockchain technology and trust evaluation techniques is recently considered as an efficient measure.
Besfort Shala +4 more
doaj +1 more source
Bitcoin is a cryptocurrency based on blockchain. All historical Bitcoin transactions are stored in the Bitcoin blockchain, but Bitcoin owners are generally unknown. This is the reason for Bitcoin's pseudo-anonymity, therefore it is often used for illegal
Fangchi Qin +5 more
doaj +1 more source
Comparative Analysis of Strategic Cyber Security Focus area – United Kingdom, Estonia, Romania [PDF]
Given the fact that cyber-security has a significant impact on many socio-economic sectors and it is dependent on the national context, it is important to analyse the strategic perspective at a national level.
Cristian CONDRUȚ
doaj
Degree of Information Security at Telecommunications Sector in Yemen
This study aimed to determine the degree of information security (confidentiality, integrity, availability) at telecommunications sector in Yemen. To achieve this, the descriptive method was followed and a questionnaire was used for collecting data from ...
Nabil Hassan Abdo Al-Hemyari
doaj +1 more source

