Capability Modeling of Information Deceiving and Achieving in Message Tampering Confrontations
暂无分享,去创建一个
[1] Hai Jin,et al. An efficient and robust one-time message authentication code scheme using feature extraction of iris in cloud computing , 2014, Proceedings of 2014 International Conference on Cloud Computing and Internet of Things.
[2] Biplab Sikdar,et al. Detecting Data Tampering In Synchrophasors Using Power Flow Entropy , 2018, 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia).
[3] Ilija Jovanov,et al. Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[4] Jelena V. Misic,et al. Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Vipul Goyal,et al. Non-malleable secret sharing , 2018, IACR Cryptol. ePrint Arch..
[6] Mahmoud Salmasizadeh,et al. Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection , 2018, IACR Cryptol. ePrint Arch..
[7] Yixian Yang,et al. An overview of general theory of security , 2017, China Communications.
[8] Niimi Michiharu,et al. Compatible 2d-code having tamper detection system with QR-code , 2014 .
[9] Xingwei Wang,et al. A security multi-path transmission algorithm based on link-security-level , 2014 .
[10] Huirong Fu,et al. Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics , 2018, 2018 IEEE International Conference on Electro/Information Technology (EIT).
[11] Vlastimil Clupek,et al. Robust mutual authentication and secure transmission of information on low-cost devices using Physical unclonable functions and Hash functions , 2016, 2016 39th International Conference on Telecommunications and Signal Processing (TSP).
[12] Biplab Sikdar,et al. Detecting data tampering attacks in synchrophasor networks using time hopping , 2016, 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).
[13] Sanjay Kumar Dhurandher,et al. Preventing packet dropping and message tampering attacks on AODV-based Mobile Ad Hoc Networks , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[14] Tao Liu,et al. Studied on Application of Double Encryption Algorithm in Covert Channel Transmission , 2018, 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS).
[15] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .