期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Impersonality in Elizabeth Bishop's The Fish
1
作者 彭月姮 《海外英语》 2015年第24期175-176,共2页
Elizabeth Bishop(1911-1979), one of the most important and distinguished poets in the twentieth-century American literary world, is recognized as unique mainly for her objective and the imaginative images and the deta... Elizabeth Bishop(1911-1979), one of the most important and distinguished poets in the twentieth-century American literary world, is recognized as unique mainly for her objective and the imaginative images and the detachment in her poetry. Her poetry emphasizes the emotional self-control and avoids the description of individual life. This style is just coincided with T. S.Eliot's theory of impersonality. The article attempts to analyze the specific use of impersonality in Bishop's poem The Fish from two aspects: the objective description of the fish and the revelation of the universal truth. 展开更多
关键词 Elizabeth Bishop The FISH impersonality
下载PDF
Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing
2
作者 V.Balaji P.Selvaraj 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2015-2027,共13页
Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probab... Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probability of offering interaction with the cloud.However,the fog computing characteristics are suscep-tible to counteract the challenges of security.The issues present with the Physical Layer Security(PLS)aspect in fog computing which included authentication,integrity,and confidentiality has been considered as a reason for the potential issues leading to the security breaches.In this work,the Octonion Algebra-inspired Non-Commutative Ring-based Fully Homomorphic Encryption Scheme(NCR-FHE)was proposed as a secrecy improvement technique to overcome the impersonation attack in cloud computing.The proposed approach was derived through the benefits of Octonion algebra to facilitate the maximum security for big data-based applications.The major issues in the physical layer security which may potentially lead to the possible security issues were identified.The potential issues causing the impersonation attack in the Fog computing environment were identified.The proposed approach was compared with the existing encryption approaches and claimed as a robust approach to identify the impersonation attack for the fog and edge network.The computation cost of the proposed NCR-FHE is identified to be significantly reduced by 7.18%,8.64%,9.42%,and 10.36%in terms of communication overhead for varying packet sizes,when compared to the benchmarked ECDH-DH,LHPPS,BF-PHE and SHE-PABF schemes. 展开更多
关键词 Fog computing physical layer security non-commutative ring-based fully homomorphic encryption impersonation attack
下载PDF
On the Relationship between T. S. Eliot and the New Criticism from Their Opinions on Literary Work and Reader
3
作者 李慧君 《海外英语》 2018年第4期135-136,143,共3页
T. S. Eliot is always considered as the pioneering father and founder of the New Criticism. This paper compares the similarities and differences of T. S. Eliot's relevant theories with those of the New Criticism f... T. S. Eliot is always considered as the pioneering father and founder of the New Criticism. This paper compares the similarities and differences of T. S. Eliot's relevant theories with those of the New Criticism from two aspects: their viewpoints of the literary works and those of the reader. It concludes that though they share the same belief in the importance of the literary works, the New Criticism is good at the subtle analysis of one text and another. However, Eliot recognizes the reader's function in the appreciation of the works which New Criticism totally objects to, and their responses should be properly considered in the criticism of the works. 展开更多
关键词 T.S. Eliot New Criticism impersonality READER
下载PDF
An enhanced scheme for mutual authentication for healthcare services 被引量:1
4
作者 Salman Shamshad Muhammad Faizan Ayub +3 位作者 Khalid Mahmood Saru Kumari Shehzad Ashraf Chaudhry Chien-Ming Chen 《Digital Communications and Networks》 SCIE CSCD 2022年第2期150-161,共12页
With the advent of state-of-art technologies,the Telecare Medicine Information System(TMIS)now offers fast and convenient healthcare services to patients at their doorsteps.However,this architecture engenders new risk... With the advent of state-of-art technologies,the Telecare Medicine Information System(TMIS)now offers fast and convenient healthcare services to patients at their doorsteps.However,this architecture engenders new risks and challenges to patients'and the server's confidentiality,integrity and security.In order to avoid any resource abuse and malicious attack,employing an authentication scheme is widely considered as the most effective approach for the TMIS to verify the legitimacy of patients and the server.Therefore,several authentication protocols have been proposed to this end.Very recently,Chaudhry et al.identified that there are vulnerabilities of impersonation attacks in Islam et al.'s scheme.Therefore,they introduced an improved protocol to mitigate those security flaws.Later,Qiu et al.proved that these schemes are vulnerable to the man-in-the-middle,impersonation and offline password guessing attacks.Thus,they introduced an improved scheme based on the fuzzy verifier techniques,which overcome all the security flaws of Chaudhry et al.'s scheme.However,there are still some security flaws in Qiu et al.'s protocol.In this article,we prove that Qiu et al.'s protocol has an incorrect notion of perfect user anonymity and is vulnerable to user impersonation attacks.Therefore,we introduce an improved protocol for authentication,which reduces all the security flaws of Qiu et al.'s protocol.We also make a comparison of our protocol with related protocols,which shows that our introduced protocol is more secure and efficient than previous protocols. 展开更多
关键词 Authentication protocol Security protocol Anonymous protocol Impersonation attack TMIS
下载PDF
Security Analysis of an Attractive Online Authentication Standard:FIDO UAF Protocol 被引量:1
5
作者 Kexin Hu Zhenfeng Zhang 《China Communications》 SCIE CSCD 2016年第12期189-198,共10页
FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this pap... FIDO(Fast IDentity Online) Alliance proposed a set of standard in 2014 for change the nature of online authentication. By now, it has drawn attention from many companies, including Google, VISA, Intel etc. In this paper, we analyze the FIDO UAF(Universal Authentication Framework) Protocol, one of the two sets of specifications in the standard. We first present protocols' cryptographic abstractions for the registration and authentication protocols of the FIDO UAF. According to the abstractions, we discuss on selected security goals presented in the standard to study UAF security properties. We also propose three attacks, which the first two are based on an assumption that an attacker can corrupt the software installed on the user device, and the third is based on two users sharing a FIDO roaming authenticator. The results of the attacks are to impersonate the legitimate user to pass the online authentication. 展开更多
关键词 FIDO UAF protocol online authentication impersonation attack protocol’s cryptographic abstraction
下载PDF
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation 被引量:1
6
作者 Inam ul haq Jian Wang +1 位作者 Youwen Zhu Saad Maqbool 《Digital Communications and Networks》 SCIE CSCD 2021年第1期140-150,共11页
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ... During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme. 展开更多
关键词 Multi-server architecture Authenticated key agreement Registration server One-way hash function Key compromise impersonation
下载PDF
The Writing Techniques of T.S Eliot——Analysis of The Love Song of J.Alfred Prufrock
7
作者 张曼 《海外英语》 2014年第12X期220-221,共2页
During T.S. Eliot's(1888-1965)whole life he left us a lot of fortune, and The Love Song of J. Alfred Prufrock is considered as one of Eliot's finest and most important works. A lot of scholars and critics have... During T.S. Eliot's(1888-1965)whole life he left us a lot of fortune, and The Love Song of J. Alfred Prufrock is considered as one of Eliot's finest and most important works. A lot of scholars and critics have done different researches on this poem.The author of this paper tries to analyze one of these poems from the perspective of T.S. Eliot's poetics. 展开更多
关键词 T.S.Eliot IMPERSONAL THEORY objective correlative
下载PDF
Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet
8
作者 Muhamad Erza Aminanto Ibnu Rifqi Purbomukti +1 位作者 Harry Chandra Kwangjo Kim 《Computers, Materials & Continua》 SCIE EI 2022年第9期5301-5314,共14页
Internet of Things(IoT)networks leverage wireless communication protocols,which adversaries can exploit.Impersonation attacks,injection attacks,and flooding are several examples of different attacks existing in Wi-Fi ... Internet of Things(IoT)networks leverage wireless communication protocols,which adversaries can exploit.Impersonation attacks,injection attacks,and flooding are several examples of different attacks existing in Wi-Fi networks.Intrusion Detection System(IDS)became one solution to distinguish those attacks from benign traffic.Deep learning techniques have been intensively utilized to classify the attacks.However,the main issue of utilizing deep learning models is projecting the data,notably tabular data,into an image.This study proposes a novel projection from wireless network attacks data into a grid-based image for feeding one of the Convolutional Neural Network(CNN)models,EfficientNet.We define the particular sequence of placing the attribute values in a grid that would be captured as an image.Combining the most important subset of attributes and EfficientNet,we aim for an accurate and lightweight IDS module deployed in IoT networks.We examine the proposed model using the Wi-Fi attacks dataset,called the AWID2 dataset.We achieve the best performance by a 99.91%F1 score and 0.11%false-positive rate.In addition,our proposed model achieved comparable results with other statistical machine learning models,which shows that our proposed model successfully exploited the spatial information of tabular data to maintain detection accuracy. 展开更多
关键词 Intrusion detection impersonation attack convolutional neural network anomaly detection
下载PDF
Authenticated Key Agreement Protocols: A Comparative Study
9
作者 Areej Omar Baalghusun Olfa Fahad Abusalem +1 位作者 Zahra Abbas Al Abbas Jayaprakash Kar 《Journal of Information Security》 2015年第1期51-58,共8页
One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have pr... One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol. 展开更多
关键词 Impersonation RESILIENCE PRIME FACTORIZATION ECDLP TRAPDOOR Function
下载PDF
Public Key Infrastructure: A Survey
10
作者 Aysha Albarqi Ethar Alzaid +2 位作者 Fatimah Al Ghamdi Somaya Asiri Jayaprakash Kar 《Journal of Information Security》 2015年第1期31-37,共7页
As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by... As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of PKIs. 展开更多
关键词 Impersonating ATTACK EPHEMERAL KEY COMPROMISE ATTACK CERTIFICATE REPOSITORY
下载PDF
Cryptanalysis and improvement of two new RFID protocols based on R-RAPSE
11
作者 Seyed Salman Sajjadi GhaemMaghami Afrooz Haghbin Mahtab Mirmohseni 《Journal of Communications and Information Networks》 2017年第3期107-122,共16页
RFID(Radio Frequency IDentification)is a pioneer technology which has depicted a new lifestyle for humanity.Nowadays we observe an increase in the number of RFID applications and no one can ignore their numerous usage... RFID(Radio Frequency IDentification)is a pioneer technology which has depicted a new lifestyle for humanity.Nowadays we observe an increase in the number of RFID applications and no one can ignore their numerous usage.An important issue with RFID systems is providing privacy requirements of these systems during authentication.Recently in 2014,Cai et al.proposed two improved RFID authentication protocols based on R-RAPS(RFID Authentication Protocol Security Enhanced Rules).We investigate the privacy of their protocols based on Ouafi and Phan privacy model and show that these protocols cannot provide private authentication for RFID users.Moreover,we show that these protocols are vulnerable to impersonation,DoS and traceability attacks.Moreover,we present two improved efficient and secure authentication protocols to ameliorate the performance of Cai et al.’s schemes.Our analysis illustrates that the existing weaknesses of the discussed protocols are eliminated in our proposed protocols. 展开更多
关键词 AUTHENTICATION RFID protocol PRIVACY security Ouafi Phan privacy model TRACEABILITY impersonation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部