Recently several reduced-operation two Factor authentication(2FA) methods have been proposed to improve the usability of traditional 2FA. The existing works cannot protect the user's password from online guessing ...
详细信息
Recently several reduced-operation two Factor authentication(2FA) methods have been proposed to improve the usability of traditional 2FA. The existing works cannot protect the user's password from online guessing attack and offline dictionary attack. They cannot resist the identity fraud attack caused by co-located attackers who have obtained the victim's password. To solve these problems, we provide a Wi Fi-based 2FA approach which can enhance security of the reduced-operation 2FA but not increase the complexity of the operation for a *** analyze our approach's security in terms of identity fraud attack resistance, salt guessing attack resistance, and password guessing attack resistance. We also implement a prototype system and test its performance in various scenarios, e.g. lab, library, and dormitory. The security analysis and experimental results show the effectiveness of our scheme for authentication.
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is *** algorithm can recognize known jamming classes,detect new(unknown)jamming classes,an...
详细信息
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is *** algorithm can recognize known jamming classes,detect new(unknown)jamming classes,and unsupervised cluseter new *** network of SNN-OWR is trained supervised with paired input data consisting of two samples from a known *** the one hand,the network is required to have the ability to distinguish whether two samples are from the same *** the other hand,the latent distribution of known class is forced to approach their own unique Gaussian distribution,which is prepared for the subsequent open set *** the test,the unknown class detection process based on Gaussian probability density function threshold is designed,and an unsupervised clustering algorithm of the unknown jamming is realized by using the prior knowledge of known *** simulation results show that when the jamming-to-noise ratio is more than 0d B,the accuracy of SNN-OWR algorithm for known jamming classes recognition,unknown jamming detection and unsupervised clustering of unknown jamming is about 95%.This indicates that the SNN-OWR algorithm can make the effect of the recognition of unknown jamming be almost the same as that of known jamming.
Division property, which was proposed by Todo [1]at EUROCRYPT 2015, is a new technique to detect integral property. It could explicitly depict the hidden properties between the traditional ALL and BALANCE properties i...
详细信息
Division property, which was proposed by Todo [1]at EUROCRYPT 2015, is a new technique to detect integral property. It could explicitly depict the hidden properties between the traditional ALL and BALANCE properties in integral cryptanalysis [2], which made it an effective method to search integral distinguishers. The definition is given as follows.
With the development of information technology,radio communicationtechnology has made rapid *** radio signals that have appeared in space are difficult to classify without manually *** radio signal clustering methods...
详细信息
With the development of information technology,radio communicationtechnology has made rapid *** radio signals that have appeared in space are difficult to classify without manually *** radio signal clustering methods have recently become an urgent need for this ***,the high complexity of deep learning makes it difficult to understand the decision results of the clustering models,making it essential to conduct interpretable *** paper proposed a combined loss function for unsupervised clustering based on *** combined loss function includes reconstruction loss and deep clustering *** clustering loss is added based on reconstruction loss,which makes similar deep features converge more in feature *** addition,a features visualization method for signal clustering was proposed to analyze the interpretability of autoencoder utilizing Saliency *** experiments have been conducted on a modulated signal dataset,and the results indicate the superior performance of our proposed method over other clustering *** particular,for the simulated dataset containing six modulation modes,when the SNR is 20dB,the clustering accuracy of the proposed method is greater than 78%.The interpretability analysis of the clustering model was performed to visualize the significant features of different modulated signals and verified the high separability of the features extracted by clustering model.
Radio modulation classification has always been an important technology in the field of *** difficulty of incremental learning in radio modulation classification is that learning new tasks will lead to catastrophic fo...
详细信息
Radio modulation classification has always been an important technology in the field of *** difficulty of incremental learning in radio modulation classification is that learning new tasks will lead to catastrophic forgetting of old *** this paper,we propose a sample memory and recall framework for incremental learning of radio modulation *** data with different signal-to-noise ratios,we use a partial memory strategy by selecting appropriate samples for *** compare the performance of our proposed method with three baselines through a large number of simulation *** show that our method achieves far higher classification accuracy than finetuning method and feature extraction ***,it performs closely to joint training method which uses all old data in terms of classification accuracy which validates the effectiveness of our method against catastrophic forgetting.
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including p...
详细信息
ISBN:
(纸本)9781849199285
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including password checking in registration, password storage in database and password identification when users log in. Our research indicates that security of the earlier version is weak, and subsequent 3.0 version provides more secure cryptographic algorithm. However, in order to acquire the compatibility, the forum software retains the weak algorithm which brings the potential security threat. According to this vulnerability, we design the corresponding attack while we also propose the countermeasures.
Different versions of WinRAR compression software use SHA-1, SHA-256 as the core and use AES-128, AES-256, and CRC32 as verification encryption. WinRAR passwords are difficult to crack, and high-efficiency hardware ac...
详细信息
With the advent of the information age, using the same standard algorithm with fixed logic is difficult to meet the increasingly diversified cryptographic application requirements of cloud computing, Internet of thing...
详细信息
In order to adapt to the rapid development of information technology in the digital age, it is necessary to build a general cryptographic service delivery capability to provide security protection for data exchange in...
详细信息
A password manager is a tool that generates, stores and manages user's passwords for local and online services. The security of the popular password managers relies on their authentication mechanism. This paper gi...
详细信息
暂无评论