Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
A lightweight identity authentication method by exploiting network covert channel
H **e, J Zhao - Peer-to-peer Networking and Applications, 2015 - Springer
The state of art authentication schemes are tightly linked with encryption or crypto systems,
which provides concrete foundations to move towards the concept of access control by …
which provides concrete foundations to move towards the concept of access control by …
Secured data transmission over insecure networks-on-chip by modulating inter-packet delays
As the network-on-chip (NoC) integrated into an SoC design can come from an untrusted
third party, there is a growing risk that data integrity and security get compromised when …
third party, there is a growing risk that data integrity and security get compromised when …
Source authentication techniques for network-on-chip router configuration packets
AK Biswas - ACM Journal on Emerging Technologies in Computing …, 2016 - dl.acm.org
It is known that maliciously configured Network-on-Chip routers can enable an attacker to
launch different attacks inside a Multiprocessor System-on-Chip. A source authentication …
launch different attacks inside a Multiprocessor System-on-Chip. A source authentication …
Elimination of the redundancy related to combining algorithms to improve the PDP evaluation performance
F Deng, LY Zhang, BY Zhou… - Mathematical …, 2016 - Wiley Online Library
If there are lots of redundancies in the policies loaded on the policy decision point (PDP) in
the authorization access control model, the system will occupy more resources in operation …
the authorization access control model, the system will occupy more resources in operation …
Policy decomposition for evaluation performance improvement of PDP
F Deng, P Chen, LY Zhang, XQ Wang… - Mathematical …, 2014 - Wiley Online Library
In conventional centralized authorization models, the evaluation performance of policy
decision point (PDP) decreases obviously with the growing numbers of rules embodied in a …
decision point (PDP) decreases obviously with the growing numbers of rules embodied in a …
A Graph and Clustering-Based Framework for Efficient XACML Policy Evaluation
Y Li, F Deng - International Journal of Cooperative Information …, 2020 - World Scientific
EXtensible Access Control Markup Language (XACML) is one of the standardized
languages for specifying access control policies. Policies described by the XACML are used …
languages for specifying access control policies. Policies described by the XACML are used …