Security

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
59 Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
40 Views

For academic purposes, we are happy to release our datasets. This dataset is in support of my research paper 'TOW-IDS: Intrusion Detection System based on Three Overlapped Wavelets in Automotive Ethernet'. If you want to use our dataset for your experiment, please cite our paper.

Categories:
3387 Views

Future wireless networks must incorporate awareness, adaptability, and intelligence as fundamental building elements in order to meet the wide range of requirements of the next-generation communication systems. Wireless sensing techniques can be used to gather awareness from the radio signals present in the surroundings. However, threats from hostile attackers, such as jamming, eavesdropping, and manipulation, are also present along with this. This paper describes in detail an RF-jamming detection test-bed and provides experimentally measured data.

Categories:
1699 Views

A real-world radio frequency (RF) fingerprinting dataset for commercial off-the-shelf (COTS) Bluetooth and WiFi emitters under challenging testbed setups is presented in this dataset. The chipsets within the devices (2 laptops and 8 commercial chips) are WiFi-Bluetooth combo transceivers. The emissions are captured with a National Instruments Ettus USRP X300 radio outfitted with a UBX160 daughterboard and a VERT2450 antenna. The receiver is tuned to record a 66.67 MHz bandwidth of the spectrum centered at the 2.414 GHz frequency.

Categories:
2540 Views

Microarchitectural attacks have become more threatening the society than before with the increasing diversity of attacks such as Spectre and Meltdown. Vendor patches cannot keep up with the pace of the new threats, which makes the dynamic anomaly detection tools more evident than before. Unfortunately, hardware performance counters (HPCs) utilized in previous works lead to high performance overhead and detection of a few microarchitectural attacks due to the small number of counters that can be profiled concurrently.

Categories:
34 Views

The dataset includes processed sequences of optical time domain reflectometry (OTDR) traces incorporating different types of fiber faults namely fiber cut, fiber eavesdropping (fiber tapping), dirty connector and bad splice. The dataset can be used for developping ML-based approaches for optical fiber fault detection, localization, idenification, and characterization. 

Categories:
3258 Views

Pages