26   Artículos

 
en línea
Guilherme Perin, Lichao Wu and Stjepan Picek    
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selec... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Muhammad Alfian, Umi Laili Yuhana, Eric Pardede and Akbar Noto Ponco Bimantoro    
Assessment is one benchmark in measuring students? abilities. However, assessment results cannot necessarily be trusted, because students sometimes cheat or even guess in answering the questions. Therefore, to obtain valid results, it is necessary to sep... ver más
Revista: Information    Formato: Electrónico

 
en línea
Okan Bulut, Guher Gorgun, Tarid Wongvorachan and Bin Tan    
Rapid guessing is an aberrant response behavior that commonly occurs in low-stakes assessments with little to no formal consequences for students. Recently, the availability of response time (RT) information in computer-based assessments has motivated re... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang    
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool f... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu    
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Khumbelo Muthavhine and Mbuyu Sumbwanyambe    
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characterist... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu    
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Robert Graczyk and Igal Sason    
Stationary memoryless sources produce two correlated random sequences ???? X n and ???? Y n . A guesser seeks to recover ???? X n in two stages, by first guessing ???? Y n and then ???? X n . The contributions of this work are twofold: (1) We characte... ver más
Revista: Information    Formato: Electrónico

 
en línea
Diogo Remoaldo and Isabel Jesus    
This paper presents the results obtained for the maximum power point tracking (MPPT) technique applied to a photovoltaic (PV) system, composed of five solar panels in series using two different methodologies. First, we considered a traditional Perturb an... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi    
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »