Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Fajiang Yu"'
Autor:
Fajiang Yu, Yanting Huang
Publikováno v:
Symmetry, Vol 16, Iss 3, p 310 (2024)
Efficient safeguarding of the security of interconnected devices, which are often resource-constrained, can be achieved through collective remote attestation schemes. However, in existing schemes, the attestation keys are independent of the device co
Externí odkaz:
https://doaj.org/article/a79995eef2b34907924b732203a95c64
Publikováno v:
Symmetry, Vol 15, Iss 4, p 913 (2023)
Lattice attacks can compromise the security of encryption algorithms used in blockchain networks, allowing attackers to tamper with transaction records, steal private keys, and execute other forms of attacks. With symmetric encryption, both parties c
Externí odkaz:
https://doaj.org/article/accb651fed694b0fa851e2053f5fe41f
Publikováno v:
IEEE Access, Vol 8, Pp 190652-190662 (2020)
Blockchain is making headlines due to it promises to provide a decentralized, transparent, tamper-resistant, traceable and verifiable historical transaction records that can resist faults of any single node. According to the latest data from State of
Externí odkaz:
https://doaj.org/article/a895caac53074a2face586a7289ffa12
Publikováno v:
Symmetry, Vol 14, Iss 12, p 2549 (2022)
Binary code similarity measurement is a popular research area in binary analysis with the recent development of deep learning-based models. Current state-of-the-art methods often use the pre-trained language model (PTLM) to embed instructions into ba
Externí odkaz:
https://doaj.org/article/c1b170ed6126437b9607337a03b21396
Publikováno v:
PLoS ONE, Vol 16, Iss 1, p e0245560 (2021)
Wide Area Protection System (WAPS) undertakes the important task of maintaining system reliability and stability when the power system is subject to abnormal or predetermined unstable conditions. The existing WAPS adopts a centralized mechanism to re
Externí odkaz:
https://doaj.org/article/1bf75f4d104d4d90b35f58f4ba977ed8
Publikováno v:
Chinese Journal of Electronics. 29:437-446
To reduce the implementation complexity and excessive overhead caused by remote attestation, we propose a new remote attestation scheme based on trusted level measurement considering the limited system resources of the Intelligent electronic devices
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:944-956
DDoS attacks have caused very serious damage to enterprise networks. Recently, a new kind of DDoS attack called link-flooding attack (LFA), has surfaced and is already being used by attackers to flood and congest network critical links. LFA is very d
Autor:
Fajiang, Yu1,2 (AUTHOR), Jing, Chen1,2 (AUTHOR) ever_cs@163.com, Yang, Xiang3 (AUTHOR), Jiacheng, Zhu1 (AUTHOR), Yangdi, Zhao1 (AUTHOR)
Publikováno v:
Electronic Commerce Research. Sep2019, Vol. 19 Issue 3, p689-718. 30p.
Publikováno v:
PLoS ONE, Vol 16, Iss 1, p e0245560 (2021)
PLoS ONE
PLoS ONE
Wide Area Protection System (WAPS) undertakes the important task of maintaining system reliability and stability when the power system is subject to abnormal or predetermined unstable conditions. The existing WAPS adopts a centralized mechanism to re
Publikováno v:
China Communications. 13:70-90
Trusted computing, which can effectively increase the credibility of information system, has made great achievements and is in continuous development. For country who is going to strengthen network construction like China, it is an important fundamen