Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy
SpringerOpen » Cybersecurity
by Chen An, Mengjie Huang, Xianhui Lu, Lei Bi and Weijie Li
2d ago
The existing physical layer security schemes, which are based on the key generation model and the wire-tap channel model, achieve security by utilizing channel reciprocity entropy and noise entropy, respective ..read more
Visit website
Dissecting zero trust: research landscape and its implementation in IoT
SpringerOpen » Cybersecurity
by Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu and Qixu Liu
2d ago
As a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the context of the Internet of Things (IoT). This pap ..read more
Visit website
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
SpringerOpen » Cybersecurity
by Batoul Achaal, Mehdi Adda, Maxime Berger, Hussein Ibrahim and Ali Awde
4d ago
Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased reliance on technology and co ..read more
Visit website
A multi-agent adaptive deep learning framework for online intrusion detection
SpringerOpen » Cybersecurity
by Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani and Amir Hossein Jahangir
5d ago
The network security analyzers use intrusion detection systems (IDSes) to distinguish malicious traffic from benign ones. The deep learning-based (DL-based) IDSes are proposed to auto-extract high-level featur ..read more
Visit website
Iterative and mixed-spaces image gradient inversion attack in federated learning
SpringerOpen » Cybersecurity
by Linwei Fang, Liming Wang and Hongjia Li
1M ago
As a distributed learning paradigm, federated learning is supposed to protect data privacy without exchanging users’ local data. Even so, the gradient inversion attack, in which the adversary can reconstruct the ..read more
Visit website
Winternitz stack protocols for embedded systems and IoT
SpringerOpen » Cybersecurity
by Alex Shafarenko
1M ago
This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle. Mutually mistrustful Alice and Bob are able to agree and sign a series of do ..read more
Visit website
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud
SpringerOpen » Cybersecurity
by Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao and Qiong Huang
2M ago
The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a po ..read more
Visit website
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks
SpringerOpen » Cybersecurity
by Haoran Lyu, Yajie Wang, Yu-an Tan, Huipeng Zhou, Yuhang Zhao and Quanxin Zhang
2M ago
Models based on MLP-Mixer architecture are becoming popular, but they still suffer from adversarial examples. Although it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolu ..read more
Visit website
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods
SpringerOpen » Cybersecurity
by Yanwei Gong, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Jianhua Wang and Haoran Zhu
2M ago
Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure ..read more
Visit website
A circuit area optimization of MK-3 S-box
SpringerOpen » Cybersecurity
by Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou and Jian Liu
3M ago
In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified th ..read more
Visit website

Follow SpringerOpen » Cybersecurity on FeedSpot

Continue with Google
Continue with Apple
OR