標題: Titlebook: Applied Cryptography and Network Security Workshops; ACNS 2021 Satellite Jianying Zhou,Chuadhry Mujeeb Ahmed,Cong Wang Conference proceedi [打印本頁] 作者: Tamoxifen 時間: 2025-3-21 16:36
書目名稱Applied Cryptography and Network Security Workshops影響因子(影響力)
書目名稱Applied Cryptography and Network Security Workshops影響因子(影響力)學科排名
書目名稱Applied Cryptography and Network Security Workshops網(wǎng)絡(luò)公開度
書目名稱Applied Cryptography and Network Security Workshops網(wǎng)絡(luò)公開度學科排名
書目名稱Applied Cryptography and Network Security Workshops被引頻次
書目名稱Applied Cryptography and Network Security Workshops被引頻次學科排名
書目名稱Applied Cryptography and Network Security Workshops年度引用
書目名稱Applied Cryptography and Network Security Workshops年度引用學科排名
書目名稱Applied Cryptography and Network Security Workshops讀者反饋
書目名稱Applied Cryptography and Network Security Workshops讀者反饋學科排名
作者: DEMN 時間: 2025-3-21 21:47 作者: 尾隨 時間: 2025-3-22 02:46
Proof of Assets in the Diem Blockchaining the financing of terrorism and sanctions laws. After Bitcoin’s MtGox scandal, one of the most needed auditing functionalities for financial solvency and tax reporting purposes is to prove ownership of blockchain reserves, a process known as Proof of Assets (PoA). This work formalizes the PoA req作者: 討好美人 時間: 2025-3-22 07:46
An Identity-Based Blind Signature Scheme with Message Recovery from?Pairingscryptography, many blind signature schemes have been proposed. Among them, Verma . designed an identity-based blind signature scheme with message recovery (IDBS-MR). Unfortunately, after our cryptanalysis, their scheme cannot satisfy untraceability, which enables the signer to break the anonymity of作者: Perineum 時間: 2025-3-22 11:03 作者: 保全 時間: 2025-3-22 16:38 作者: esthetician 時間: 2025-3-22 19:13 作者: Allege 時間: 2025-3-22 23:41 作者: fatty-streak 時間: 2025-3-23 04:43
Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGAvestigates the application of deep learning techniques for this purpose. Deep learning significantly increases detection performance, and can abolish the need for expert knowledge-intensive feature extraction. The use of deep learning for network intrusion detection also has a major disadvantage, ho作者: hangdog 時間: 2025-3-23 08:26 作者: 輕觸 時間: 2025-3-23 11:50
Quantum Computing Threat Modelling on a Generic CPS Setupdies against the threat. At the algorithm-level, the two most popular public-key cryptosystems, RSA and ECC, are vulnerable to quantum cryptanalysis using Shor’s algorithm, while symmetric key and hash-based cryptosystems are weakened by Grover’s algorithm. Less is understood at the implementation l作者: OASIS 時間: 2025-3-23 15:03 作者: 變化 時間: 2025-3-23 19:05 作者: vasculitis 時間: 2025-3-24 01:35
WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments A digitized facility needs the possibility of communication between distributed nodes, e.g. to react to events or to provide useful information to adjust the production process. However, processes of communication can be misused by attackers. Security holes in different information systems can be fo作者: 削減 時間: 2025-3-24 05:59
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchainusceptible towards faults and physical attacks. In this context, we discuss recently proposed Manipulation-of-Demand via IoT attack, False Data Injection Attacks and Electric Fault Attacks. These attacks directly or indirectly can lead to localized blackout, falsified load forecasting, imbalance in 作者: 類型 時間: 2025-3-24 09:26
Hoang Yen Phuong,Phuong Quyen Vo These are needed to operate a supply chain efficiently and allow timely deliverables to consumers. In our work, we identify and map a typical business process to demonstrate how we can securely allow participants to interact with smart contracts and discover potential use cases for supply chains.作者: conscience 時間: 2025-3-24 14:19
Phuong Quyen Vo,Hoang Yen Phuonglem that it is difficult to identify the identity of network interactive users. Yet, user identification raises questions about user privacy. In the last paper [[, we proposed a user identification method based on Mining Web Usage Profiles from Proxy Logs. For the previous user identification system作者: CHART 時間: 2025-3-24 18:48 作者: 可互換 時間: 2025-3-24 19:39
Hoang Yen Phuong,Phuong Quyen Vocryptography, many blind signature schemes have been proposed. Among them, Verma . designed an identity-based blind signature scheme with message recovery (IDBS-MR). Unfortunately, after our cryptanalysis, their scheme cannot satisfy untraceability, which enables the signer to break the anonymity of作者: 幼兒 時間: 2025-3-25 02:45 作者: 背景 時間: 2025-3-25 06:27 作者: initiate 時間: 2025-3-25 09:42 作者: 血統(tǒng) 時間: 2025-3-25 13:30
Engaging, Energizing, and Empowering Faculty benefit from capabilities offered by convolutional neural networks, such as dimensionality reduction and the inherent ability to reduce the trace desynchronization effects. These neural networks contain at least three types of layers: convolutional, pooling, and dense layers. Although the definitio作者: 蒸發(fā) 時間: 2025-3-25 15:53
Taking the Lead to Promote Innovationvestigates the application of deep learning techniques for this purpose. Deep learning significantly increases detection performance, and can abolish the need for expert knowledge-intensive feature extraction. The use of deep learning for network intrusion detection also has a major disadvantage, ho作者: 果核 時間: 2025-3-25 22:29
Mackenzie Bristow,Elizabeth F. Soppelsaned model leads to not only the infringement of intellectual property but also various attacks such as adversarial example attacks. Recent works have proposed several methods using trusted execution environments (TEEs), which provide an isolated environment that cannot be manipulated by malicious so作者: CERE 時間: 2025-3-26 02:25
https://doi.org/10.1007/978-1-349-22297-1dies against the threat. At the algorithm-level, the two most popular public-key cryptosystems, RSA and ECC, are vulnerable to quantum cryptanalysis using Shor’s algorithm, while symmetric key and hash-based cryptosystems are weakened by Grover’s algorithm. Less is understood at the implementation l作者: 僵硬 時間: 2025-3-26 07:31 作者: nettle 時間: 2025-3-26 12:15 作者: 急急忙忙 時間: 2025-3-26 16:07
Lili Cavalheiro,Luis Guerra,Ricardo PereiraA digitized facility needs the possibility of communication between distributed nodes, e.g. to react to events or to provide useful information to adjust the production process. However, processes of communication can be misused by attackers. Security holes in different information systems can be fo作者: patriarch 時間: 2025-3-26 17:36
Karin Richter,Andreas Weissenb?ckusceptible towards faults and physical attacks. In this context, we discuss recently proposed Manipulation-of-Demand via IoT attack, False Data Injection Attacks and Electric Fault Attacks. These attacks directly or indirectly can lead to localized blackout, falsified load forecasting, imbalance in 作者: 輪流 時間: 2025-3-26 21:21
Applied Cryptography and Network Security Workshops978-3-030-81645-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 預知 時間: 2025-3-27 01:47 作者: bisphosphonate 時間: 2025-3-27 08:48 作者: engrossed 時間: 2025-3-27 12:13 作者: Processes 時間: 2025-3-27 15:56
https://doi.org/10.1007/978-3-030-81645-2artificial intelligence; authentication; communication systems; computer hardware; computer networks; com作者: 自負的人 時間: 2025-3-27 18:14
978-3-030-81644-5Springer Nature Switzerland AG 2021作者: MOTIF 時間: 2025-3-28 01:20
Phuong Quyen Vo,Hoang Yen Phuonger can hide her identity by obfuscating her web usage pattern through adding or hiding random HTTP connections. In experimental evaluation, we examine the time-period being necessary to obfuscate an identity based on a two-week log file being provided by our industrial partners.作者: 類人猿 時間: 2025-3-28 04:19
English Language Teacher Educationlates state and commands vectors of the plant is mutated to create several attacks, referred to as ., using attack mutation operators (.). The method is applied to a functional water treatment plant testbed. Experiments show the value of . in assessing the effectiveness of . .作者: patriot 時間: 2025-3-28 09:29
The Obfuscation Method of User Identification Systemer can hide her identity by obfuscating her web usage pattern through adding or hiding random HTTP connections. In experimental evaluation, we examine the time-period being necessary to obfuscate an identity based on a two-week log file being provided by our industrial partners.作者: 事與愿違 時間: 2025-3-28 11:37 作者: SHOCK 時間: 2025-3-28 15:03
Conference proceedings 2021urity, ACNS 2021, held in?Kamakura, Japan, in June 2021..The 26 papers presented in this volume were carefully reviewed and selected from 49 submissions. They stem from the following workshops:..?..AIBlock 2021:. Third International Workshop on Application Intelligence and Blockchain Security..?..AI作者: Blanch 時間: 2025-3-28 19:57 作者: 現(xiàn)代 時間: 2025-3-29 01:56 作者: Lethargic 時間: 2025-3-29 03:07 作者: Accolade 時間: 2025-3-29 09:45
Proof of Assets in the Diem Blockchainld wallets, locked assets, spending-ability delegation and account pruning, among the others. We also propose practical optimizations to the byte-size of PoA in the presence of light clients who cannot run a full node, including skipping . updates, while still maintaining the 66.67% Byzantine fault tolerance (BFT) guarantee.作者: 定點 時間: 2025-3-29 12:14 作者: 運動的我 時間: 2025-3-29 16:31 作者: 水土 時間: 2025-3-29 23:11 作者: 暫時別動 時間: 2025-3-30 00:55
Ideologies of Global and Local English,so introduce a reverse-engineering module in our approach to uncover the DRAM bank addressing functions (which are not available publicly) based on a novel bin-partitioning algorithm. We further show that our detection methodology can reliably detect a Rowhammer process with 97% accuracy. In a more 作者: Esophagus 時間: 2025-3-30 06:24 作者: 說明 時間: 2025-3-30 11:30 作者: 違法事實 時間: 2025-3-30 13:01 作者: Endemic 時間: 2025-3-30 20:31 作者: enfeeble 時間: 2025-3-30 22:06
https://doi.org/10.1007/978-1-349-22297-1a PASTA threat modelling exercise on a generic Cyber-Physical System (CPS) to demonstrate its efficacy and report our findings. We also include mitigation strategies identified during the threat modelling exercise for CPS owners to adopt.作者: Indebted 時間: 2025-3-31 04:21
https://doi.org/10.1007/978-1-349-22297-1affecting power grid operation. Furthermore, DVRs are geographically distributed and span over multiple management domains, which expands the potential attack surface. Once the attack is mounted against DVRs, the possible consequences include the damage of equipment and furthermore, in the worst cas作者: 使習慣于 時間: 2025-3-31 08:24
Lili Cavalheiro,Luis Guerra,Ricardo Pereiraor industrial Ethernet is being researched on an industrial line testbed. In the current work, the requirements for intrusion detection in an industrial environment are analyzed and a hardware architecture to carry out online intrusion detection for Ethernet-based connections using a passive sniffer