The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to globalization of IC, hardware is defenseless to new sorts of assaults, for example, counterfeiting, figuring out and IP piracy. Logic locking technique is used for the hardware security. Logic locking conceals the functionality and implementation of a design by inserting additional gates into the original design. The gates inserted for the locking are called key-gates. To display its correct...
Traditional multi-step attack correlation approaches based on intrusion alerts face the challenge of recognizing attack scenarios because these approaches require complex pre-defined association rules as well as a high dependency on expert knowledge. Meanwhile, they barely consider the privacy issues. Under such circumstance, a novel algorithm is proposed to construct multi-step attack scenarios based...
In recent past, Volos et al proposed an image encryption scheme based on true random bits generator in [Signal Processing 93, 1328–1340, 2013]. The TRBG uses two mutually coupled double scroll chaotic systems that are synchronized via complete chaotic synchronization and inverse π-lag synchronization techniques. The numerical simulations demonstrated the effectiveness of chaotic true random bits generator...
In the context of voltage stability, this paper describes a fast algorithm that estimates the maximum loadability point (MLP) of a power system from its power flow equations. First it estimates the load level where each generator reaches its reactive limit, this is done using a quadratic curve fitting technique. After that another quadratic curve is used to estimate the MLP. From two power flow solutions,...
The security of cryptographic functions such as pseudo random number generators (PRNGs) can usually not be mathematically proven. Instead, statistical properties of the generator are commonly evaluated using standardized test batteries on a limited number of output values. This paper demonstrates that valuable additional information about the properties of the algorithm can be gathered by analyzing...
We introduce a new family of binary linear codes suitable for steganographic matrix embedding. The main characteristic of the codes is the staircase random block structure of the generator matrix. We propose an efficient list decoding algorithm for the codes that finds a close codeword to a given random word. We provide both theoretical analysis of the performance and stability of the decoding algorithm,...
Voltage stability is a crucial factor in power system operation. When bus voltage exceeds the operation limits because of change of the operation mode, load in the network or the environmental factors, appropriate control actions should be taken to guarantee a secure system operation, avoiding emergency situations or voltage collapse. Development and improvement of the algorithm for voltage security...
In deregulated electricity market, the power marketers share a common transmission network for transferring power from generating station to distribution station. All the market participants, in the open access environment wants to maximize their profit, so they try to obtain the electrical energy from the cheapest source, which may lead to congestion in the transmission network and affect the system...
This paper proposes an algorithm fast searching for key transmission section based on power component of line. Firstly, graph theory is used to calculate the real power transfer among individual generators and loads, then classify the lines based on the Ward's cluster analysis method to search the set of lines which have the similar power component to overload line, finally determine the parallel...
Pseudorandom number generators (PRNGs) are used frequently in secure data processing algorithms. Randomness measuring is an essential test, performed on these generators, that help to range the security of the designed algorithm with respect to assure strong messing-up of the processed data. This paper describes a solution for accelerating statistical tests of Diehard Battery based on reconfigurable...
This paper presents a novel fast algorithm, which consists of two parts, namely, Choquet fuzzy integral for generation of a pseudo-random keystream, and a self-adaptive masking process for increasing shuffling pixels of the image. The first part, which is the major core of the encryption algorithm, is a pseudo-random keystream generator based on the Choquet fuzzy integral. A 128-bit key is used for...
In the process of formal analysis based on strand space model, it is generally based on the assumption that the cryptographic algorithm used in protocol is secure. By introducing an insecure signature algorithm, we extend the penetrator model of strand space and improve the authentication test method based on parameters consistency, and then extend the expression and analysis ability of the strand...
Random number generator (RNG) is widely used in cryptographic system as the cryptographic keys generator. These keys are the most important component in the system since the security of the cryptographic system relies entirely on its quality. As digital circuit becomes faster and smaller, some of the desired properties a RNG should have are low-power and good statistical quality. This paper presents...
Many applications in Dynamic Peer Group are becoming increasing popular nowadays. There is a need for security services to provide group-oriented communication privacy and data integrity. To provide this form of group communication privacy, it is important that members of the group can establish a common secret key for encrypting group communication data. A secure distributed group key agreement and...
This paper mainly analysis and describe the design issue of stream ciphers in Network security as the streams are widely used to protecting the privacy of digital information. A variety of attacks against stream cipher exist;(algebraic and so on). These attacks have been very successful against a variety of stream ciphers. So in this paper efforts have been done to design and analyze stream ciphers...
Earlier the model suggested was much generalized and simple. It was lacking in clarity about the functioning of its components, which made it difficult to be implemented. In this paper an improved model for the security policy framework is suggested, in which functioning of each component and there interconnectivity is explained clearly. The fitness functions for the system and which parameter can...
If the trip of overload branch may cause cascading tripping in corresponding section, emergency overload control should be executed to ensure the security of the transmission section and maintain its integrality and transmission capacity. A series of improvements against the conventional sensitivity algorithm are proposed, which include the advance of the integrative sensitivity, the use of equal...
First, based on the bilinear pairings, a new computing problem, inverse bilinear paring operation problem (IBPOP), is proposed, which is proved to be not easier than the computing diffie-Hellman problem (CDHP) and not harder than discrete logarithm problem (DLP). So, if the symbol ldquolesrdquo denotes the increase of the hardness of computing problem, it can be deduced that CDHPlesIBPOPlesDLP. Then,...
Most of pairing-based schemes need two or more operations of pairings. To find an efficient randomized certificate-based signature from pairings, by constructing a fraction such that a random element of the gap Diffie-Hellman group is included in the numerator and the sum of the master key and the output of the hash function is included in the denominator, a new signature scheme from pairings is proposed,...
Collaborative design is one of core processes for networked manufacturing, so how to safely transfer design information in the network has important significance. In order to provide the confidentiality of transmission information on the level of design team in collaborative design system, a new broadcast encryption scheme based on designerpsilas identity is presented. The new scheme is based on broadcast...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.