The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposed a chaotic image scrambling scheme based on sorting transformation. The algorithm calculates the permuting address codes by sorting the chaotic sequence. Therefore, the scheme does not require knowing the probability density function of the chaotic orbits in advance, thus not only facilitating the choice of chaotic systems but also reducing the complexity of the scheme. The paper...
WPP(Wind Power Penetration) is an important indicator to ensure wind power system security. It is with great practical significance for knowing probability distribution of WPP. There were two types of method to calculate probability distribution of WPP in the past. One type of method which used statistic theory to calculate were fast but had to know simple function relationship between WPP and load...
Network covert channels can be used to transfer secret information in network protocols. For a kind of network covert channels hidden in overt sources with fixed probability distribution, we propose a modified Pearson chi-square test which improves detection accuracy. We incorporated adjacent probability values and divided the new distribution into two partitions sensitive to different hidden sections...
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design path-selection strategies that minimize the probability that the adversary can successfully control the entrance to and exit from the network. This minimizes the chance that the adversary can observe and correlate patterns...
The increasing demand for voice over IP (VoIP) and the accompanying network convergence lead into a new area of security risks for voice infrastructures. A probability based risk analysis as an integral part of a security concept is presented which forges a hardened base system operating a voice platform. A modeling approach and a detailed system architecture is derived for the VoIP base system. Finally...
Network security management plays a crucial role in protecting organization assets and its computer infrastructure. This can be done by identifying the vulnerabilities and developing effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is linked to multiple variables. These variables are associated with the organization assets and their...
Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for...
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference. In this paper, we propose a completely new attack with 2 bits...
Bayesian networks are indispensable for determining the probability of events which are influenced by various components. Bayesian probabilities encode degrees of belief about certain events and a dynamic knowledge body is used to strengthen, update, or weaken these assumptions. The creation of Bayesian networks requires at least three challenging tasks: (i) the determination of relevant influence...
Collaborative sensing in cognitive radio networks can significantly improve the probability of detecting the transmission of primary users. In current collaborative sensing schemes, all collaborative secondary users are assumed to be honest. As a consequence, the system is vulnerable to attacks in which malicious secondary users report false detection results. In this paper, we investigate how to...
The developments of differential and linear cryptanalysis methods were capable to breach the security of the DES cipher. Accordingly, the National Institute of Standards and Technology (NIST) issued a new standard named Advanced Encryption Standard (AES) which had SPN (substitution permutation network) structure as a new next generation code standard method as a replacement for DES. However, this...
A protocol is secure if the parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's party data. During computation of inputs, we had considered the factor, what if trusted third parties are malicious? Considering...
Network security management plays a crucial role in protecting organization assets and its computer infrastructure by identifying an effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is affected by multiple distinctive variables. These variables are associated with the organization assets and their impact on the health of the organization...
This paper presents a new block-wise fragile watermarking scheme based on scramble encryption to improve security. In the proposed algorithm, the watermark derived from a block is not embedded in the least significant bit (LSB) of itself; rather, it is randomly distributed onto the LSB of whole host image by scramble encryption. In the verification stages, the predefined threshold is used to localize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.