期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Ultrasonic testing and microscopic analysis on concrete under sulfate attack and cyclic environment 被引量:7
1
作者 姜磊 牛荻涛 +1 位作者 孙迎召 费倩男 《Journal of Central South University》 SCIE EI CAS 2014年第12期4723-4731,共9页
The damage process of concrete exposed to sodium sulfate attack and drying-wetting cycles was investigated. The water to binder(W/B) ratio and the concentration of sulfate solution were taken as variable parameters. T... The damage process of concrete exposed to sodium sulfate attack and drying-wetting cycles was investigated. The water to binder(W/B) ratio and the concentration of sulfate solution were taken as variable parameters. Through the experiment, visual change, relative dynamic modulus of elasticity(RDME) and the surface damage layer thickness of concrete were measured.Furthermore, SEM and thermal analysis were used to investigate the changing of microstructure and corrosion products of concrete.The test results show that the ultrasonic velocity is related to the damage layer of concrete. It approves that an increase in damage layer thickness reduces the compactness and the ultrasonic velocity. The deterioration degree of concrete could be estimated effectively by measuring the surface damage layer and the RDME of concrete. It is also found that the content of gypsum in concrete is less than that of ettringite in test, and some gypsum is checked only after a certain corrosion extent. When the concrete is with high W/B ratio or exposed to high concentration of sulfate solution, the content of ettringite first increases and then decreases with corrosion time. However, the content of gypsum increases at a steady rate. The content of corrosion products does not correspond well with the observations of RDME change, and extensive amount of corrosion products can be formed before obvious damage occurs. 展开更多
关键词 sulfate attack drying-wetting cycles damage layer thickness thermal analysis
下载PDF
Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
2
作者 Nadia Mustaqim Ansari Rashid Hussain +1 位作者 Sheeraz Arif Syed Sajjad Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1861-1875,共15页
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat... The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA). 展开更多
关键词 Side channel attacks power analysis attacks network security MASKING advance encryption standard
下载PDF
Clustering Collision Power Attack on RSA-CRT 被引量:1
3
作者 Wunan Wan Jun Chen +3 位作者 Jinyue Xia Jinquan Zhang Shibin Zhang Hao Chen 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期417-434,共18页
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd... In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs.This attack method is that the key parameters dp and dq are segmented by byte,and the modular multiplication collisions are identified by k-means clustering.The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs,and the exponent d was obtained.We also propose a second order clustering collision power analysis attack against RSA implementation with CRT,which applies double blinding exponentiation.To reduce noise and artificial participation,we analyze the power points of interest by preprocessing and k-means clustering with horizontal correlation collisions.Thus,we recovered approximately 91%of the secret exponents manipulated with a single power curve on RSA-CRT with countermeasures of double blinding methods. 展开更多
关键词 Collision attack power analysis attack chosen-message attack module exponentiation RSA-CRT
下载PDF
Collision-Based Chosen-Message Simple Power Clustering Attack Algorithm 被引量:1
4
作者 陈艾东 许森 +1 位作者 陈运 秦志光 《China Communications》 SCIE CSCD 2013年第5期114-119,共6页
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif... Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%. 展开更多
关键词 crypt analysis side channel attack collision attack chosen-message attack clustering algorithm
下载PDF
Unsteady aerodynamics modeling for flight dynamics application 被引量:13
5
作者 Qing Wang Kai-Feng He. +3 位作者 Wei-Qi Qian Tian-Jiao Zhang Yan-Qing Cheng Kai-Yuan Wu 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2012年第1期14-23,共10页
In view of engineering application, it is practicable to decompose the aerodynamics into three components: the static aerodynamics, the aerodynamic increment due to steady rotations, and the aerodynamic increment due... In view of engineering application, it is practicable to decompose the aerodynamics into three components: the static aerodynamics, the aerodynamic increment due to steady rotations, and the aerodynamic increment due to unsteady separated and vortical flow. The first and the second components can be presented in conventional forms, while the third is described using a one-order differential equation and a radial-basis-function (RBF) network. For an aircraft configuration, the mathematical models of 6- component aerodynamic coefficients are set up from the wind tunnel test data of pitch, yaw, roll, and coupled yawroll large-amplitude oscillations. The flight dynamics of an aircraft is studied by the bifurcation analysis technique in the case of quasi-steady aerodynamics and unsteady aerodynam- ics, respectively. The results show that: (1) unsteady aerodynamics has no effect upon the existence of trim points, but affects their stability; (2) unsteady aerodynamics has great effects upon the existence, stability, and amplitudes of periodic solutions; and (3) unsteady aerodynamics changes the stable regions of trim points obviously. Furthermore, the dynamic responses of the aircraft to elevator deflections are inspected. It is shown that the unsteady aerodynamics is beneficial to dynamic stability for the present aircraft. Finally, the effects of unsteady aerodynamics on the post-stall maneuverability 展开更多
关键词 Unsteady aerodynamics High angle of attack Mathematical model Flight dynamics - Bifurcation analysis Post-stall maneuver
下载PDF
Secure design for cloud control system against distributed denial of service attack 被引量:5
6
作者 Yasir ALI Yuanqing XIA +1 位作者 Liang MA Ahmad HAMMAD 《Control Theory and Technology》 EI CSCD 2018年第1期14-24,共11页
Nowadays, the development of cloud computing has given power to the resource-constrained network control system (NCS) to out-source heavy computations to the cloud server. However, the development of Cloud Computing... Nowadays, the development of cloud computing has given power to the resource-constrained network control system (NCS) to out-source heavy computations to the cloud server. However, the development of Cloud Computing produced many security challenges regarding the cyber-physical connection between the cloud and control system. The connection between the control system and cloud server can be subjected to distributed denial of service (DDoS) attack by an attacker to destabilize the NCS. In this paper, we will address this issue by building a secure mechanism for such systems. We will design a detection approach and a mitigation approach for better stable performance of NCS. To ensure the stability of NCS at the time of DDoS attack, we will also design a switching mechanism (SM) for cloud control system (CCS) when there are no more real time solutions available from the cloud. Finally, we will apply the proposed mechanism to an unmanned arial vehicle (UAV). Our simulation results show that the mechanism works well in stability and protection of NCS under DDoS attack. 展开更多
关键词 Cloud control system security of NCS analysis of DDoS attack on NCS
原文传递
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security 被引量:3
7
作者 Zhen Chen Linyun Ruan +2 位作者 Junwei Cao Yifan Yu Xin Jiang 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期406-417,共12页
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves stora... The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics. 展开更多
关键词 network security traffic archival forensic analysis phishing attack bitmap database hadoop distributed file system cloud computing NoSQL
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部