Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsup...
详细信息
security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol...
security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol become particularly important. In this paper, firstly, we introduce SmartVerif, which is the first formal analysis tool to automatically verify the security of protocols through dynamic strategies. And then, we use SmartVerif to verify the pseudo-randomness of the encapsulated key of the Two-Pass AKE protocol, which was proposed by Liu's in ASIACRYPT in 2020. Finally, we summary our work and show some limitations of SmartVerif. At the same time, we also point out the direction for future improvement of SmartVerif.
This paper studies the problem of aligning a set of face images of the same individual into a normalized image while removing the outliers like partial occlusion, extreme facial expression as well as significant illum...
详细信息
The issue of classifying rock images is one of most important problems in geological detection and analysis. In order to improve rock recognition performance, we use convolution neural network (CNN) based deep learnin...
详细信息
Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses th...
详细信息
Studying the spatiotemporal distribution of SARS-CoV-2 infections among healthcare workers (HCWs) can aid in protecting them from exposure. In this study, an open-source dataset of HCW diagnoses was provided, and the ...
详细信息
The secure issues of APK are very important in Android *** order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mechanism(APK-SA...
详细信息
The secure issues of APK are very important in Android *** order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mechanism(APK-SAN).By exploring sanitizable signature technology,APK-SAN allows the original developer to authorize specified modifier who can redevelop the designated source code of APK *** scheme does not require interactions between the developer and *** can reduce the communication overhead and computational overhead for ***,the signature of redeveloped APK files is valid and maintains the *** proposed APK-SAN signature can effectively protect the security of the redeveloped APK files and copyrights of the developer and modifier.
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain...
详细信息
Using the reduced graphene oxide(rGO) as a saturable absorber(SA) in an Er-doped fiber(EDF) laser cavity,we obtain the Q-switching operation. The rGO SA is prepared by depositing the GO on fluorine mica(FM) us...
详细信息
Using the reduced graphene oxide(rGO) as a saturable absorber(SA) in an Er-doped fiber(EDF) laser cavity,we obtain the Q-switching operation. The rGO SA is prepared by depositing the GO on fluorine mica(FM) using the thermal reduction method. The modulation depth of rGO/FM is measured to be 3.2%. By incorporating the rGO/FM film into the EDF laser cavity, we obtain stable Q-switched pulses. The shortest pulse duration is3.53 μs, and the maximum single pulse energy is 48.19 nJ. The long-term stability of working is well *** experimental results show that the rGO possesses potential photonics applications.
暂无评论