Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Ming-Kung Sun"'
Autor:
Ming-Kung Sun, 孫明功
91
In this paper, we propose a threshold restrictive partially blind signature scheme based on the discrete logarithm problem. The original structure includes the following two concepts: one is the Harn’s threshold signature scheme without the
In this paper, we propose a threshold restrictive partially blind signature scheme based on the discrete logarithm problem. The original structure includes the following two concepts: one is the Harn’s threshold signature scheme without the
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/59006445149711502965
Publikováno v:
Sensor Networks and Signal Processing ISBN: 9789811549168
In this study, we present a framework to detect a Domain Name System (DNS) tunnel and DNS exfiltration network traffic by using both unsupervised and supervised learning algorithms. In general, considerable time is required to learn the structure of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe7de398d1d15b18b4991bcc3e38561d
https://doi.org/10.1007/978-981-15-4917-5_40
https://doi.org/10.1007/978-981-15-4917-5_40
Publikováno v:
ICAIIC
In recent years, insider threats within computers have been overgrowing because a high quantity of malware and its variants have been spread massively by spam mail, malvertising attack, and users' carelessness. Moreover, some of the dormant malware w
Publikováno v:
iCAST
Web of Science
Web of Science
Failure to detect malware at its very inception leaves room for it to post significant threat and cost to cyber security for not only individuals, organizations but also the society and nation. However, the rapid growth in volume and diversity of mal
Publikováno v:
COMPSAC (2)
Botnets are one of most serious threats in cyber security. Many previous studies have been proposed for botnet detection. Among those approaches, one of main tracks focuses on extracting informative features from network traffic flows. Nevertheless,
Publikováno v:
IEICE Transactions on Information and Systems. :2991-3000
Publikováno v:
IBICA
Mobile ad hoc networks (MANET) have the properties of open medium and decentralized structure, so malicious nodes can easily attack MANET nodes. Furthermore, it is more difficult to establish a protection mechanism on a dynamic topology than a fixed
Publikováno v:
2012 International Conference on Information Security and Intelligent Control.
Mobile ad hoc networks have unique features, such as variable topology and lack of centralized management, therefore key management faces additional difficulty for deployed in this environment. In this paper, a (n, t, n) secret sharing method is appl
Publikováno v:
ICPADS
Many researchers monitor malicious software (malware) behavior using Virtual Machines (VM) to protect the underlying operating system. For virtual machines, the malware monitor process exists at the same layer as the real system so the monitor can ge
Publikováno v:
CCNC
The term Digital Rights Management (DRM) generally refers to a set of policies and techniques that guide the proper use of digital content. Due to the nature of digital content, it is easily modified and distributed. DRM is already progressive in man