GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Mathematics  (2)
Material
Publisher
Person/Organisation
Language
Years
FID
  • Mathematics  (2)
  • 1
    Online Resource
    Online Resource
    Hindawi Limited ; 2014
    In:  Journal of Applied Mathematics Vol. 2014 ( 2014), p. 1-14
    In: Journal of Applied Mathematics, Hindawi Limited, Vol. 2014 ( 2014), p. 1-14
    Abstract: Both in traditional social network and in mobile network environment, the worm is a serious threat, and this threat is growing all the time. Mobile smartphones generally promote the development of mobile network. The traditional antivirus technologies have become powerless when facing mobile networks. The development of benign worms, especially active benign worms and passive benign worms, has become a new network security measure. In this paper, we focused on the spread of worm in mobile environment and proposed the benign worm control and repair mechanism. The control process of mobile benign worms is divided into two stages: the first stage is rapid repair control, which uses active benign worm to deal with malicious worm in the mobile network; when the network is relatively stable, it enters the second stage of postrepair and uses passive mode to optimize the environment for the purpose of controlling the mobile network. Considering whether the existence of benign worm, we simplified the model and analyzed the four situations. Finally, we use simulation to verify the model. This control mechanism for benign worm propagation is of guiding significance to control the network security.
    Type of Medium: Online Resource
    ISSN: 1110-757X , 1687-0042
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2014
    detail.hit.zdb_id: 2578385-3
    SSG: 17,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hindawi Limited ; 2011
    In:  Journal of Applied Mathematics Vol. 2011 ( 2011), p. 1-11
    In: Journal of Applied Mathematics, Hindawi Limited, Vol. 2011 ( 2011), p. 1-11
    Abstract: In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽 p with base point P ∈ E ( 𝔽 p ) . Applying the fault attack on these curves, the discrete logarithm on the curve can be computed in subexponential time of L p ( 1 / 2 , 1 + o ( 1 ) ) . The runtime bound relies on heuristics conjecture about smooth numbers similar to the ones used by Lenstra, 1987.
    Type of Medium: Online Resource
    ISSN: 1110-757X , 1687-0042
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2011
    detail.hit.zdb_id: 2578385-3
    SSG: 17,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...