Lattice basis reduction algorithms, such as LLL, play a very important role in cryptography, which usually aim to find a lattice basis with good "orthogonality". However, not every lattice has an orthogonal ...
详细信息
In the paper, regarding the transport layer security encrypted traffic of the Internet, the application program identification and application protocol classification technology of encrypted traffic based on hidden Ma...
详细信息
With the development of unmanned platforms, there are large numbers of unmanned aerial vehicles(UAVs), due to UAVs' new features such as lightweight, high speed mobility and heterogeneous, UAVs are facing great ch...
详细信息
We experimentally demonstrated the use of intelligent impairment equalization(IIE)for microwave downconversion link linearization in noncooperative *** an equalizer is realized based on an artificial neural network(AN...
详细信息
We experimentally demonstrated the use of intelligent impairment equalization(IIE)for microwave downconversion link linearization in noncooperative *** an equalizer is realized based on an artificial neural network(ANN).Once the training process is completed,the inverse link transfer function can be *** the inverse transformation for the detected signal after transmission,the third-order intermodulation distortion components are suppressed significantly without requiring any prior information from an input RF ***,fast training speed is achieved,since the configuration of ANN-based equalizer is *** results show that the spurious-free dynamic range of the proposed link is improved to 106.5 dB·Hz^(2/3),which is 11.3 dB higher than that of a link without ***,the training epochs reduce to only five,which has the potential to meet the practical engineering requirement.
Wired equivalent privacy (WEP) is a security protocol in the IEEE 802.11 wireless standard. At present, three attacks are frequently exploited: chopchop attack, Korek attack, and PTW attack. The first can decrypt a pa...
详细信息
Feedback shift registers(FSRs) are a fundamental component in electronics and secure communication. An FSR f is said to be reducible if all the output sequences of another FSR g can also be generated by f and the FSR ...
详细信息
WeChat is a popular instant messaging application on Android,iPhone and BlackBerry smart phones,whose chat messages are all stored in local installation *** paper studied the data forensic techniques of WeChat message...
详细信息
ISBN:
(纸本)9781509011964
WeChat is a popular instant messaging application on Android,iPhone and BlackBerry smart phones,whose chat messages are all stored in local installation *** paper studied the data forensic techniques of WeChat messages including the identification of storage location,storage structure and information extraction *** the text message is stored in encrypted SQLite database,we detailedly analyze its cryptographic algorithm,key derivation principle and present the corresponding database decryption process in different practical forensic *** addition,we exploit the data recovery of voice and deleted messages which would also be helpful in data forensic for criminal investigation.
Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel not...
详细信息
Federated learning (FL) enables multiple users to collaboratively train a global model by keeping their data sets local. Since a single server is used, traditional FL faces the single point of failure problem. An avai...
详细信息
Quantum access network with 8 nodes and a secret key rate of over 6 Mbps per user is firstly demonstrated using passive optical distribution network facilities, paving the way of high-performance and scalable quantum-...
详细信息
暂无评论