Showing 21 - 36 results of 36 for search 'batch attack', query time: 0.05s Refine Results
  1. 21

    Evaluating Mixing Methods: Anonymity, Long-Term Information Leakage, and Cost by Alperen Aksoy, Dogan Kesdogan

    Published 2025-01-01
    “…When deploying systems, two well-known mixing methods, batch (e.g., Timed Mix) and continuous mixing (e.g., Stop-and-Go Mix), are commonly used in real-world Mix-nets. …”
    Get full text
    Article
  2. 22

    Joint timeliness and security provisioning for enhancement of dependability in Internet of Vehicle system by Tao Jing, Hengyu Yu, Xiaoxuan Wang, Qinghe Gao

    Published 2022-06-01
    “…This article proposes a vehicle-assisted batch verification (VABV) system for IoV, in which some vehicles called auxiliary authentication terminal (AAT) are selected to assist the roadside unit for Basic Safety Message (BSM) verification. …”
    Get full text
    Article
  3. 23

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…Our theoretical security analysis and experiments show that the proposed scheme is secure in compared attack models, such as impersonation attacks, replay attacks, the man-in-the-middle attacks, and so on. …”
    Get full text
    Article
  4. 24

    CHERI-Crypt: Transparent Memory Encryption on Capability Architectures by Jennifer Jackson, Minmin Jiang, David Oswald

    Published 2025-03-01
    “…Trusted execution environments however, have been proven vulnerable to not just software-based attacks, but hardware attacks as well. In this paper we present our CHERI-Crypt design, an encryption engine extension to a CHERI-RISC-V 32-bit processor, for transparent memory encryption of sealed CHERI capabilities to additionally protect sensitive data in memory against physical hardware attacks. …”
    Get full text
    Article
  5. 25

    Influence of Microstructure on the Corrosion Resistance of Low Carbon Uns S41003 Stainless Steel by L.F. Guedes, E.A. Ponzio, V.M. Santos, A.R. Pimenta, S.S.M. Tavares

    Published 2025-05-01
    “…In this work the corrosion resistance was evaluated in specimens processed by three different ways: hot rolling (HR), batch annealing (ANN), and water quenching from 1000ºC (Q). …”
    Get full text
    Article
  6. 26

    CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs by Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan

    Published 2024-09-01
    “…In this paper, cryptanalysis of Xiong’s CLAS scheme revealed its vulnerabilities to partial key replacement and identity replacement attacks, alongside mathematical errors in the batch verification process. …”
    Get full text
    Article
  7. 27

    Multiple image encryption algorithm using channel randomization and multiple chaotic maps by Khalid M. Hosny, Yasmin M. Elnabawy, Rania A. Salama, Ahmed M. Elshewey

    Published 2024-12-01
    “…Abstract Developing robust and secure image encryption methods for transmitting multiple images in batches over unprotected networks has become imperative. …”
    Get full text
    Article
  8. 28

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  9. 29

    Efficient handover authentication protocol for cloud-edge collaborative UAV networks by RUI Li, ZHANG Xiongwei, YANG Jibin, XU Weiguang

    Published 2025-06-01
    “…The protocol employed an anonymous response segmentation method using additive congruence to protect challenge-response pair (CRP) against machine learning attacks. A Chinese remainder theorem-based dynamic CRP fragmentation mechanism was developed for batch synchronization, enabling regional non-real-time pre-negotiation to enhance efficiency and stability during real-time handover authentication. …”
    Get full text
    Article
  10. 30

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  11. 31

    Efficient and privacy-preserving certificateless data aggregation in Internet of things–enabled smart grid by Aijing Sun, Axin Wu, Xiaokun Zheng, Fangyuan Ren

    Published 2019-04-01
    “…The proposed scheme can resist replay attacks, modification attacks, and impersonation attacks. …”
    Get full text
    Article
  12. 32

    An Interpretable Method for Anomaly Detection in Multivariate Time Series Predictions by Shijie Tang, Yong Ding, Huiyong Wang

    Published 2025-07-01
    “…To address this concern, we propose an interpretable method for an anomaly detection model based on gradient optimization, which can perform batch interpretation of data without affecting model performance. …”
    Get full text
    Article
  13. 33

    Alpha Phi-shing Fraternity: Phishing Assessment in a Higher Education Institution by Marco Casagrande, Mauro Conti, Monica Fedeli, Eleonora Losiouk

    Published 2023-01-01
    “…In this paper, we showcase a phishing assessment at the University of Redacted aimed to identify the people, and the features of such people, that are more susceptible to phishing attacks. We delivered phishing emails to 1.508 subjects in three separate batches, collecting a clickrate equal to 30%, 11% and 13%, respectively. …”
    Get full text
    Article
  14. 34

    Blockchain-based high transparent PKI authentication protocol by Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN

    Published 2022-08-01
    “…The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.…”
    Get full text
    Article
  15. 35

    ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments by Cong Wang, Haoyu Wu, Yulong Gan, Rui Zhang, Maode Ma

    Published 2025-04-01
    “…However, existing signature schemes for NDN-IoT face dual challenges: resource-constrained IoT terminals struggle with certificate management and computationally intensive bilinear pairings under traditional Public Key Infrastructure (PKI), while NDN routers require low-latency batch verification for high-speed data forwarding. …”
    Get full text
    Article
  16. 36

    Approximation of Interactive Betweenness Centrality in Large Complex Networks by Sebastian Wandelt, Xing Shi, Xiaoqian Sun

    Published 2020-01-01
    “…Moreover, we explore the idea of batch removal, where groups of top-k ranked nodes are removed before recomputation of betweenness centrality values. …”
    Get full text
    Article