In order to provide a more timely communication environment and achieve long-distance, low-cost voice information transmission in emergency rescue tasks after disasters, this article describes an intelligent voice pro...
详细信息
Facial Emotion Recognition (FER) has emerged as a pivotal domain within computer vision, with applications spanning diverse fields such as human-computer interaction, mental health monitoring, andsecurity systems. Wh...
详细信息
In this work, a novel FPGA-based data-binding architecture incorporating PUFs and a user-specific encryption key to protect the confidentiality of data on external non-volatile memories is presented. By utilizing an i...
详细信息
ISBN:
(纸本)9798400704826
In this work, a novel FPGA-based data-binding architecture incorporating PUFs and a user-specific encryption key to protect the confidentiality of data on external non-volatile memories is presented. By utilizing an intrinsic PUF derived from the same memory, the confidential data is additionally bound to the device. This feature proves valuable in cases where software is restricted to be executed exclusively on specific hardware or privacy-critical data is not allowed to be decrypted elsewhere. To improve the resistance against hardware attacks, a novel method to randomly select memory cells utilized for PUF measurements is presented. The FPGA-based design presented in this work allows for low latency as well as small area utilization, offers high adaptability to diverse hardware and software platforms, and is accessible from bare-metal programs to full Linux kernels. Moreover, a detailed performance andsecurity evaluation is conducted on five boards. A single read or write operation can be executed in 0.58 mu s when utilizing the lightweight PRINCE cipher on an AMD Zync 7000 MPSoC. Furthermore, the entire architecture occupies only about 10% of the FPGA's available space on a resource-constrained AMD PYNQ-Z2. Ultimately, the implementation is demonstrated by storing confidential user data on new generations of network base stations equipped with FPGAs.
Computing the distance between two non-normalized vectors.. and.., represented by Delta(x,y) and comparing it to a predefined public threshold tau is an essential functionality used in privacy-sensitive applications s...
详细信息
ISBN:
(纸本)9798400704826
Computing the distance between two non-normalized vectors.. and.., represented by Delta(x,y) and comparing it to a predefined public threshold tau is an essential functionality used in privacy-sensitive applications such as biometric authentication, identification, machine learning algorithms (e.g., linear regression, k-nearest neighbors, etc.), and typo-tolerant password-based authentication. Tackling a widely used distance metric, Nomadic studies the privacypreserving evaluation of cosine similarity in a two-party (2PC) distributed setting. We illustrate this setting in a scenario where a client uses biometrics to authenticate to a service provider, outsourcing the distance calculation to two computing servers. In this setting, we propose two novel 2PC protocols to evaluate the normalising cosine similarity between non-normalised two vectors followed by comparison to a public threshold, one in the semihonest and one in the malicious setting. Our protocols combine additive secret sharing with function secret sharing, saving one communication round by employing a new building block to compute the composition of a function.. yielding a binary result with a subsequent binary gate. Overall, our protocols outperform all prior works, requiring only two communication rounds under a strong threat model that also deals with malicious inputs via normalisation. We evaluate our protocols in the setting of biometric authentication using voice, and the obtained results reveal a notable efficiency improvement compared to existing state-of-the-art works.
The Fifth Generation of communications Networks (5G) is projected to greatly develop wireless cellular networks by delivering quicker speed, higher capacity, and lower latency. It is expected to significantly alter bo...
详细信息
作者:
Duan, HuiHubei University
School of Computer and Information Engineering Hubei Province Wuhan China
The existing information security situation awareness technology mostly uses RBF (RBF) radiation basis functions to extract information, which is susceptible to changes in the time domain threshold of attacks, resulti...
详细信息
The proceedings contain 75 papers. The topics discussed include: blockchain technology model to increase transparency in the distribution of aid to disaster victims;design of a 1000 W boost inverter using the sine pul...
ISBN:
(纸本)9798331504373
The proceedings contain 75 papers. The topics discussed include: blockchain technology model to increase transparency in the distribution of aid to disaster victims;design of a 1000 W boost inverter using the sine pulse wave modulation (SPWM) method;optimizing wall materials to reduce electrical energy consumption of building;implementation of yolo and face recognition on a security camera system for visitor detection in the computer and network lab of UNS;sharding blockchain model to reduce the costs of presidential elections in Indonesia base on blockchain technology;optimal placement of insertion transformers in distribution system;mobile-based nutrition and physical activity management for diabetes patients using google fit and react native;and enhancing traffic signs recognition systems through Gabor feature extraction techniques.
The Internet of Things (IoT) has brought unprecedented connectivity, transforming technology across industries. This interconnected landscape, however, presents unprecedented network security challenges. This paper ex...
详细信息
Recent research in network management and the enhancement of network security efficiency has seen a widespread use of traffic classification and clustering The increasing use of the Internet and the development of pro...
详细信息
ISBN:
(纸本)9783031734199;9783031734205
Recent research in network management and the enhancement of network security efficiency has seen a widespread use of traffic classification and clustering The increasing use of the Internet and the development of protocols and applications have also made research in the field of traffic classification highly relevant. Vulnerability assessments and penetration testing are determine the security posture of modern information networks. By assessing university network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing security specialists are able to evaluate the effectiveness of their network defenses by identifying defense weaknesses, affirming the defense mechanisms in place. The purpose of this article is to determine the main tasks of penetration testing monitoring, investigate methods for vulnerability network traffic, and explore intellectual analysis methods used for penetration testing monitoring. Also, analyzing the of an penetration testing monitoring system capable of integrating components and methods to transmit information within a specified timeframe, detect interventions, control the development of events, identify, categorize, and effectively use modern security tools is envisaged.
The GMS-BPI Gym System is like a super cool computer program for gyms! It helps gym owners and people who go to the gym. For the owners, it makes things easier like signing up new members, planning classes, fixing gym...
详细信息
暂无评论