作者: 走路左晃右晃 時間: 2025-3-21 21:34 作者: figure 時間: 2025-3-22 00:35 作者: 可憎 時間: 2025-3-22 07:01
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited ARM–NEON, INTEL–SSE, INTEL–AVX2). The methods achieved the fault attack resistance with intra-instruction redundancy feature in SIMD instruction set. Finally, we applied the new fault attack countermeasures on the block cipher LEA and achieved the intra-instruction redundancy and high performance over modern ARM-NEON architectures.作者: obstinate 時間: 2025-3-22 09:38 作者: 彩色 時間: 2025-3-22 16:08
O,TR: Offline Off-the-Record (OTR) Messagingotype to support O.TR based on the Gajim XMMP instant messaging platform. Our experiments showed that O.TR can reliably be used when a network party is broken down. Moreover, O.TR provides an efficient session refreshment which is about . faster than the original OTR.作者: 磨碎 時間: 2025-3-22 17:29
Evolution of Spamming Attacks on Facebookmessenger. We study such the advanced spamming campaign so as to demystify how it has been worked and settled down on Facebook ecosystem. We build a crawler and analyser which collect 0.6 million of comments; afterwards, extracts the targeted spams. Our data shows that the spams are systematic, well-structured, obfuscated and even localized.作者: frenzy 時間: 2025-3-22 23:51 作者: invade 時間: 2025-3-23 01:24
Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuitsversary who triggered the hardware Trojan may infer multiple input values from a single output of the target logic, thereby obtaining multiple outputs of the preceding logics, by monitoring the existence of the natural glitches. We perform experiments and discuss the results and threats, not to be neglected, along with a possible mitigation.作者: Creatinine-Test 時間: 2025-3-23 06:53
Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Codethe response of the detector and herein present optimized thresholds for our method. Based on the experiments, the proposed method outperformed conventional robust mesh watermarking against collusion attack in all cases.作者: HAUNT 時間: 2025-3-23 12:15 作者: Seizure 時間: 2025-3-23 17:23 作者: Admire 時間: 2025-3-23 21:23
0302-9743 and emerging technologies; systems security?and authentication; crypto protocols; and attack detections and legal aspects..978-3-319-93562-1978-3-319-93563-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 滔滔不絕地講 時間: 2025-3-24 02:03 作者: 廢止 時間: 2025-3-24 06:02
Breaking Text CAPTCHA by Repeated InformationHA image when joining a cafe group, but this CAPTCHA is structured in a very regular format which can be read very simply if used repeatedly. We can read the text characters by bot with very high accuracy through some easy steps, among 2,000 sample CAPTHCAs.作者: 分發(fā) 時間: 2025-3-24 08:36 作者: 有害處 時間: 2025-3-24 10:57
0302-9743 cations,?WISA 2017, held on Jeju Island, Korea, in August 2017..The 12 revised full papers and 15 short papers presented in this?volume were carefully reviewed and selected from 53 submissions. The?papers are organized in topical sections such as attack and defense;?theory in security; web security 作者: infinite 時間: 2025-3-24 15:45
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465297.jpg作者: Neuropeptides 時間: 2025-3-24 21:26 作者: 河潭 時間: 2025-3-25 01:54 作者: Crohns-disease 時間: 2025-3-25 07:21
https://doi.org/10.1007/978-3-319-93563-8Analysis of network and security protocol; Authentication and authorization; Botnet defense; Critical i作者: 波動 時間: 2025-3-25 09:24
f applications related to financial products whose value is Mathematical finance and financial engineering have been rapidly expanding fields of science over the past three decades. The main reason behind this phenomenon has been the success of sophisticated quantitative methodolo- gies in helping p作者: detach 時間: 2025-3-25 14:43
dramatically. One consequence of this development is a paradigm shift in the way organizations manage their relationships with individuals. At one time, when dealing with large populations, standard practice was to segment people into relatively few groups, and then apply identical relationship man作者: A精確的 時間: 2025-3-25 19:54 作者: mitten 時間: 2025-3-25 21:02 作者: 擴張 時間: 2025-3-26 03:35 作者: Mri485 時間: 2025-3-26 04:54
parameter estimation or modelling. Many different methods of model construction exist, and there are many theoretical arguments why one method is better than another, or why such and such a method is/is not appropriate in a given set of circumstances. However, for predictive modelling the method use作者: Biomarker 時間: 2025-3-26 10:54
Haoyu Li,Yanbin Pan which firms will default and which will not, so assessments can only be made on the likelihood of default. As a consequence, firms generally pay a spread over the default-free rate of interest that is proportional to their default probability to compensate lenders for this uncertainty. Default is a作者: fallible 時間: 2025-3-26 13:47 作者: 斜谷 時間: 2025-3-26 17:03
Mahdi Daghmehchi Firoozjaei,Sang Min Lee,Hyoungshick Kime businesspeople who attempted to make a living in a period of commercial challenges. Inconvenient though it is for historians eager to model the vagaries of the later medieval economy, we need to always be mindful that it was the business decisions of individuals that shaped the aggregate trend lin作者: adulterant 時間: 2025-3-26 22:24
Hwajeong Seo,Taehwan Park,Janghyun Ji,Zhi Hu,Howon Kimater medieval England. She describes London’s unique position in the later Middle Ages as follows: ‘By the early fourteenth century London was pre-eminent among English urban communities. Whether ranked according to wealth or according to population, its pre-eminence was undisputed. Although London 作者: 蒸發(fā) 時間: 2025-3-27 01:10 作者: 把…比做 時間: 2025-3-27 06:01 作者: 使無效 時間: 2025-3-27 13:00 作者: 威脅你 時間: 2025-3-27 15:23 作者: 現(xiàn)任者 時間: 2025-3-27 17:54 作者: Genistein 時間: 2025-3-28 01:49
Jae Hyeon Woo,Moosung Park,Kyungho Leesions. Regulators, in a slightly alternative context, perform a similar task. They face, however, a rather different set of constraints and objectives. Regulators, in fact, use standardized models to promote fairness, a level playing field, monitor the solvency of individual entities, and enhance ov作者: Pepsin 時間: 2025-3-28 05:48
Jonathan Grimm,Irfan Ahmed,Vassil Roussev,Manish Bhatt,ManPyo Hongdent Bernoulli trials, a binomial default-loss distribution emerges. A critical assumption of this introductory approach, however, is statistical independence between the default of various obligors in one’s portfolio. While of great mathematical convenience, this is an indefensible supposition. Not作者: acrobat 時間: 2025-3-28 09:45 作者: Initiative 時間: 2025-3-28 13:34
Kwon-Jin Yoon,Jaehyeon Yoon,Souhwan Jungwhen a sustained load is applied. It is important to understand the mechanisms as this will pave the way for improvements that can be made to reduce this creep and will also assist in creating prediction models as it will be based on the fundamental mechanisms involved. This paper presents results o作者: Outwit 時間: 2025-3-28 18:35
Momoka Kasuya,Kazuo Sakiyamabehaviour of cracked fibre reinforced concrete under sustained load, investigating statically determinate and indeterminate test setups, fibre type (steel and polymer macro fibres) and fibre dosage. The duration of the creep tests ranges from less than 1 to 14?years. The following observations were 作者: FLAX 時間: 2025-3-28 21:49
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisitedh the communication is securely encrypted, the system can be exploited by malicious users if the attackers inject fault signal to the system and extract the user’s secret information. For this reason, we need to ensure the high performance encryption together with secure countermeasures against side作者: escalate 時間: 2025-3-28 23:54
Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networksmework to detect the manipulation of images through a contextual violation. First, we proposed a context learning convolutional neural networks (CL-CNN) that detects the contextual violation in the image. In combination with a well-known object detector such as R-CNN, the proposed method can evaluat作者: Neuralgia 時間: 2025-3-29 06:11
Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Codecheme for an anti-collusion code. In contrast to the existing robust mesh watermarking which provides unsuitable primitives for anti-collusion code, the proposed method has well-operated capacity to carry the anti-collusion fingerprint code. In order to minimize the detection error, we also modeled 作者: Vasodilation 時間: 2025-3-29 09:36 作者: VICT 時間: 2025-3-29 11:49 作者: ABIDE 時間: 2025-3-29 17:30
O,TR: Offline Off-the-Record (OTR) Messagingt applicable in some practical scenarios (e.g., when communication network became disconnected) because OTR requires both parties to be online at the same time. To address this limitation, we extend the conventional OTR into a new protocol named offline OTR (O.TR). O.TR makes the conversation partie作者: Contend 時間: 2025-3-29 20:33
ARM/NEON Co-design of Multiplication/Squaringn SISD are accelerated by re-writing the previous implementations in SIMD instruction sets. Particularly, integer multiplication and squaring operations are the most expensive in Public Key Cryptography (PKC). Many works have been conducted to reduce the execution timing in NEON instruction set. How作者: Mosaic 時間: 2025-3-30 02:21 作者: PHAG 時間: 2025-3-30 04:35
Evolution of Spamming Attacks on Facebookrvice, over the past decades. Whereas, we have still been suffering from the attack though the service vendors as well as academia have been making best effort on winning such arms race. Such being the case, Facebook have also been inevitable to confront spamming campaign in order not to be overwhel作者: nominal 時間: 2025-3-30 10:15
Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encr regarded as a way to maintain user privacy on the untrusted cloud. However, HE is not widely used in machine learning and signal processing communities because the HE libraries are currently supporting only simple operations like integer addition and multiplication. It is known that division and ot作者: 教義 時間: 2025-3-30 15:08
Breaking Text CAPTCHA by Repeated Informationor choose some images from the provider’s choice. . portal site, which is one of the most famous web portal site in Korea, asks text response in CAPTCHA image when joining a cafe group, but this CAPTCHA is structured in a very regular format which can be read very simply if used repeatedly. We can r作者: Arb853 時間: 2025-3-30 19:41 作者: HEAVY 時間: 2025-3-30 23:41
Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic CircuitsTo avoid a detection mechanism, hardware Trojans may need a stealthy nature in their existence for being dormant, and even when triggered. In this paper, we devise a new hardware Trojan concept that exploits natural glitches and their control mechanisms for information leakage in a stealthy manner. 作者: FIN 時間: 2025-3-31 02:09 作者: 自負的人 時間: 2025-3-31 05:34 作者: 無王時期, 時間: 2025-3-31 11:52 作者: Cuisine 時間: 2025-3-31 16:26
Jungwoo Joh,Yezee Seo,Hoon-Kyu Kim,Taekyoung Kwoncial forms of credit business to statistical calibrations and practical implementations. This unique and timely book constitutes an indispensable tool for both practitioners and academics working in the evaluation of credit risk..978-3-642-05854-7978-3-662-06427-6Series ISSN 1616-0533 Series E-ISSN 2195-0687