Biometric authentication systems have become increasingly popular due to their convenience and perceived security benefits. However, traditional biometric modalities such as fingerprint recognition are vulnerable to s...
详细信息
Submarines are vital for military defense and national security in strategic communication systems. Power Spectral Density (PSD) characterizes signal spectrum frequency dependence and is crucial for analyzing broadban...
详细信息
The proceedings contain 57 papers. The topics discussed include: water quality pH prediction study based on improved Ceemdan and RLNNA;research on the military application and development suggestions of artificial int...
ISBN:
(纸本)9798400711237
The proceedings contain 57 papers. The topics discussed include: water quality pH prediction study based on improved Ceemdan and RLNNA;research on the military application and development suggestions of artificial intelligence;vision-based leader-follower formation control for mobile robots;research and application of e-commerce marketing fraud detection method based on graph neural network;machine learning-based income inequality prediction: a case study;an experimental study of the tones of Guangxi Fu Yang official dialect based on computer technology;significance target detection based on improved pool net;research on profit prediction of backup clamps for conductors and ground wires in transmission line engineering based on machine learning;and interactive exhibition design and application of museums under virtual simulation technology.
To address the pressing issue of wild animal incursions in rural areas, we propose an inventive solution to safeguard local communities, the project integrates fog computing and smart video compression. The system rec...
详细信息
The abstract Data security is of most importance, in the present day- the introduction of high-level wireless communication channels has led to generation and transfer of massive amounts of data. Data security must ke...
详细信息
Instant Runoff Voting (IRV) is one example of ranked-choice voting. It provides many known benefits when used in elections, such as minimising vote splitting, ensuring few votes are wasted, and providing resistance to...
详细信息
ISBN:
(纸本)9798400704826
Instant Runoff Voting (IRV) is one example of ranked-choice voting. It provides many known benefits when used in elections, such as minimising vote splitting, ensuring few votes are wasted, and providing resistance to strategic voting. However, the voting and tallying procedures for IRV are much more complicated than those of plurality and are both error-prone and tedious. Many automated systems have been proposed to simplify these procedures in IRV. Some of these also employ cryptographic techniques to protect the secrecy of ballots and enable verification of the tally. Nearly all of these cryptographic systems require a set of trustworthy tallying authorities (TAs) to perform the decryption of votes and/or running of mix servers, which adds significant complexity to the implementation and election management. We address this issue by proposing Camel: an E2E verifiable solution for IRV that requires no TAs. Camel employs a novel representation and a universally verifiable shifting procedure for ballots that facilitate the elimination of candidates as required in an IRV election. We combine these with a homomorphic encryption scheme and zero-knowledge proofs to protect the secrecy of the ballots and enable any party to verify the well-formedness of the ballots and the correctness of the tally in an IRV election. We examine the security of Camel and prove it maintains ballot secrecy by limiting the learned information (namely the tally) against a set of colluding voters.
WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity by signing a challenge with a private key, which is st...
详细信息
ISBN:
(纸本)9798400704826
WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity by signing a challenge with a private key, which is stored on a device such as a cell phone or a USB security token. This approach avoids many of the common security problems with password-based authentication. WebAuthn's reliance on proof-of-possession leads to a usability issue, however: a user who loses access to their authenticator device either loses access to their accounts or is required to fall back on a weaker authentication mechanism. To solve this problem, Yubico has proposed a protocol which allows a user to link two tokens in such a way that one (the primary authenticator) can generate public keys on behalf of the other (the backup authenticator). With this solution, users authenticate with a single token, only relying on their backup token if necessary for account recovery. However, Yubico's protocol relies on the hardness of the discrete logarithm problem for its security and hence is vulnerable to an attacker with a powerful enough quantum computer. We present a WebAuthn recovery protocol which can be instantiated with quantum-safe primitives. We also critique the security model used in previous analysis of Yubico's protocol and propose a new framework which we use to evaluate the security of both the group-based and the quantum-safe protocol. This leads us to uncover a weakness in Yubico's proposal which escaped detection in prior work but was revealed by our model. In our security analysis, we require the cryptographic primitives underlying the protocols to satisfy a number of novel security properties such as KEM unlinkability, which we formalize. We prove that well-known quantum-safe algorithms, including CRYSTALS-Kyber, satisfy the properties required for analysis of our quantum-safe protocol.
The digital landscape is facing threats from malicious actors, including malware, phishing, ransomware, and distributed denial-of-service attacks. This article introduces the Hybrid Intelligent Random Forest (HIRF) me...
详细信息
The proceedings contain 164 papers. The topics discussed include: watch product categorization through Conv2D sequential covolutional neural network with truncated normal kernel initializer;tweeting the blues: leverag...
ISBN:
(纸本)9798350371314
The proceedings contain 164 papers. The topics discussed include: watch product categorization through Conv2D sequential covolutional neural network with truncated normal kernel initializer;tweeting the blues: leveraging NLP and classification models for depression detection;transfer learning empowered multi-class classification of kidney diseases: a deep learning approach;post-quantum cryptography for multiple high-resolution millimeter wave images for enhanced security in IOT networks;performance analysis of query-based image tagging model in CBIR;enhancing network security: leveraging isolation forest for malware detection;cryptoRAN: a review on cryptojacking and ransomware attacks W.R.T. banking industry - threats, challenges, & problems;RIS: intelligent responsive interface solution, a promising desktop assistant for differently-abled;and IoT-enabled medicine dispenser for pills and liquid medication.
Deep neural networks (DNNs) play a crucial role in image classification and object detection, with applications in autonomous driving, security, Unmanned AerialVehicle (UAV) navigation, and robotics. Ensuring secure e...
详细信息
暂无评论