-
1
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01“…Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency and security of authentication.By using symmetric encryption technology, the proposed solution ensured the confidentiality of the message and increase the attack difficulty.The theoretical analysis proved the proposed scheme can resist common man-in-the-middle attacks.Experimental comparison results show the scheme has better performance than similar schemes.…”
Get full text
Article -
2
-
3
Single- versus Multiobjective Optimization for Evolution of Neural Controllers in Ms. Pac-Man
Published 2013-01-01“…In general, therefore, it seems that PAESNet_F yielded better results in training phase. But the PAESNet_M successfully reduces the runtime operation and complexity of ANN by minimizing the number of hidden neurons needed in hidden layer and also it provides better generalization capability for controlling the game agent in a nondeterministic and dynamic environment.…”
Get full text
Article -
4
Mansplaining explained: The role of the better-than-average effect and the interpretation bias in acts and accusations of mansplaining
Published 2024-01-01“…Study 2 (N = 247) showed that women are more likely to interpret an explanation as insulting than men, regardless of whether the explanation was given by a man or a woman. The current study provides empirical evidence to give mansplaining its proper conceptual grounding in communication theories and shows that communication biases are a viable avenue to understand mansplaining and similar communication phenomena.…”
Get full text
Article -
5
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01“…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
Get full text
Article -
6
HUBUNGAN ANTARA MOTIVASI BELAJAR DENGAN PEMAHAMAN KONSEP FISIKA PESERTA DIDIK MAN BARAKA
Published 2020-08-01“…From the results of this study, it can be concluded that there is a relationship between learning and learning with the understanding of MAN Baraka students' concepts and the direction of correlation is positive. …”
Get full text
Article -
7
-
8
Economic Rhetoric in the Thought of John Paul II
Published 2024-12-01“…The authors use the method of analysis and synthesis, focusing on a man being at the center of economic activity. …”
Get full text
Article -
9
Design and Simulation of Flexible Lower Limb Assisted Exoskeletons Based on the OpenSim
Published 2024-05-01“…This study uses the OpenSim software to establish a simulation of man-machine interaction with the flexible exoskeleton. …”
Get full text
Article -
10
A method for synthetic speech detection using local phase quantization
Published 2024-02-01Get full text
Article -
11
-
12
-
13
-
14
A Recommendation Model Using the Bandwagon Effect for E-Marketing Purposes in IoT
Published 2015-07-01Get full text
Article -
15
Determining timeframes to death for imminently dying patients: a retrospective cohort study
Published 2025-01-01Get full text
Article -
16
-
17
-
18
-
19
Pricing Strategy and Carbon Emission Abatement under Cap-and-Trade Regulation Considering Social Learning
Published 2019-01-01Get full text
Article -
20