Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ...
详细信息
The progress of target network topology discovery research is slow due to the uncertainty of the target network range, and large-scale network measurement activities lead to a large accumulation of "false links&q...
详细信息
In this paper, we focus on differential fault attack on lightweight block ciphers with GFN (Generalized Feistel Networks) structure. With regard to fault injection model and differential equations solving, two improve...
详细信息
The structure of the network in the real world is very complex, as the dynamic network structure evolves in time dimension, how to detect network changes accurately and further locate abnormal nodes is a research hots...
详细信息
The notion of attack surface shifting is introduced to describe the situation of shifting the attack surface in the moving target defense system. However, the situation of shifting the attack surface in the mimic defe...
详细信息
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition...
详细信息
Nowadays the mobile devices are becoming the necessities in our life, while they are generally resource-constrained, CP-ABE schemes designed for mobile devices should have the property of low computational complexity,...
详细信息
As cloud computing becomes popular, more and more sensitive information are being centralized into the cloud. Hence, we need some mechanism to support operations on encrypted data in many applications in cloud. Public...
详细信息
With the prevalence of artificial intelligence and the continuous development of information-based teaching, the emergence of smart classrooms has provided a new teaching environment for classroom teaching. As a new a...
详细信息
The rapid development of Android devices brings the increase of security requirements, especially for access control. Recently, many enhancements have been put forward towards the Android permission mechanism. However...
详细信息
暂无评论