2. Analyzing Anonymous Communication Technology and Its Attack-resistant Comparing 匿名技术分析及其抗攻击性比较 ilib.cn3. Rotation Attack Resistant Digital Watermarking Based on Bilinear Interpolation 基于频域双线性插值的数字水印算法 www.ilib.cn4. Geometrical Attack Resistant Digital Image Watermarking Based...
A lock can include attack-resistant and/or weather-resistant features. Attack-resistant features can include a sacrificial link between a locking mechanism and an external keyway covering an exterior face of the locking mechanism. The sacrificial link can break during a torque attack on the lock ...
Federated learning has a variety of applications in multiple domains by utilizing private training data stored on different devices. However, the aggregation process in federated learning is highly vulnerable to adversarial attacks so that the global model may behave abnormally under attacks. To tackle ...
Attack-Resistant Trust Metrics for Public Key Certification This paper investigates the role of trust metrics in attack-resistant public key certification. We present an analytical framework for understanding the ef... R Levien,A Aiken - Usenix Security Symposium 被引量: 513发表: 1998年 An Attack...
An attack-resistant padlock has a shackle of maraged steel, deadlocked in locked position by a pair of oppositely-moving bolts positively driven by a rotary throw member having specially-shaped driving lugs, which have long arcuate external faces tangent to transverse faces on the bolts to positi...
Wireless positioning is vulnerable to malicious attacks due to the nature of its open medium. This study proposes an attack-resistant fingerprinting localization algorithm based on a probabilistic inclusive disjunction model. This model allows an attacked observation to play a less significant role during...
Attack-resistant Location Estimation In Wireless Sensor Networks and simulation) of all the secure and resilient location estimation schemes that can be used on the current generation of sensor platforms (e.g., MICA seri... D Liu,P Ning,AN Liu,... - 《Acm Transaction on Information & System...
1) DoS attack-resistant DoS攻击限制1. This paper models DoS attack-resistant as a repeated-game based on such an assumption that sensor nodes are rational. 本文在假设网络节点为理性的基础上,提出了面向重复博弈的DoS攻击限制模型。2) DOS nuke attack DOS nuke攻击 1. With the phenomenon that ...
The Meaning of Attack-Resistant Systems...Herbert HochbergPhilosophica
专利名称:Attack-resistant implementation method 发明人:Masahiro Kaminaga,Takashi Endo,Takashi Watanabe 申请号:US10021042 申请日:20011219 公开号:US06986054B2 公开日:20060110 专利内容由知识产权出版社提供 专利附图:摘要:The present invention makes it difficult for unauthorized parties to estimate ...