期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Modeling and Simulation of Low Rate of Denial of Service Attacks
1
《International English Education Research》 2014年第1期31-34,共4页
The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using a... The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference. 展开更多
关键词 Low-Rate Denial of Service attacks Congestion Control attack prevention Network Security
下载PDF
Tracing Precept against Self-Protective Tortious Decoder
2
作者 Jie Tian Xin-Fang Zhang +1 位作者 Yi-Lin Song Wei Xiang 《Journal of Electronic Science and Technology of China》 2007年第2期115-119,共5页
Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the con... Traceability precept is a broadcast encryption technique that content suppliers can trace malicious authorized users who leak the decryption key to an unauthorized user. To protect the data from eavesdropping, the content supplier encrypts the data and broadcast the cryptograph that only its subscribers can decrypt. However, a traitor may clone his decoder and sell the pirate decoders for profits. The traitor can modify the private key and the decryption program inside the pirate decoder to avoid divulging his identity. Furthermore, some traitors may fabricate a new legal private key together that cannot be traced to the creators. So in this paper, a renewed precept is proposed to achieve both revocation at a different level of capacity in each distribution and black-box tracing against self-protective pirate decoders. The rigorous mathematical deduction shows that our algorithm possess security property. 展开更多
关键词 attack prevention broadcast encryption Diffie-Hellman problem malicious subscriber tracing algorithm.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部