搜索资源列表
MFCUK_darkside_0.3
- Darkside attack rfid mifare classic
OnDesignatedlyVerifiedNon-interactive)Watermarking
- On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed
SIRB
- In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gl
vm2
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
0909.0573
- this a paper on minimizing cache timing attack on aes using cache flushing algorithm-this is a paper on minimizing cache timing attack on aes using cache flushing algorithm
charset-attack-in-webapp
- Web应用程序中的字符集攻击 目录 为什么要讨论字符集攻击 字节流和数据的本质 web架构层次 web数据处理流程 字符集处理过程中可能出现的安全问题 web各个层中的字符集攻击 其他可能出现的攻击 在应用程序中避免出现字符集问题 -Web application character set attack Directory Why attack the character set to be discussed Byte str
For-WSN-localization-algorithm
- 用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
Watermarking-Against-Attack
- 小波和余弦变换的抗几何攻击数字水印算法,Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack-Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack
Label-Based-DV-Hop-Localization-AgainstWormhole-A
- label based dv hop localization against warm hole attack in wireless sensor network
IJEST10-02-09-22
- Attack in Ad hoc Network
Birthday-Attack
- This Birthday attack document that tells about birthday attack with example.-This is Birthday attack document that tells about birthday attack with example.
Battery-Draining-Denial-of-Service-Attack-on-Blue
- Battery-Draining-Denial-of-Service Attack on Bluetooth Devices
paper-on-Acoustic-side-channel-attack
- This paper focuses on acoustic (sound) side-channel attack and surveys the methods and techniques employed in the attack we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against t
SINKHOLE-ATTACK-AND-DET.odt
- A discr iption of Sink hole attack and how to detect sink hole attack in wireless sensing network.
Attack Analysis in MANET
- Attack Analysis in MANET
A-SELF-TEST-TO-DETECT-A-HEART-ATTACK-USING-A-MOBI
- A SELF-TEST TO DETECT A HEART ATTACK USING A MOBILE PHONE AND WEARABLE SENSORS
Simulation-of-Gray-Hole-Attack-in-Adhoc-Network-U
- Simulation of Gray Hole Attack in Adhoc Network Using NS2
Performance-Analysis-of-Black-Hole-Attack-on-diff
- Performance Analysis of Black Hole Attack ondifferent MANET Routing Protocols
A-New-Attack-on-RSA-and-CRT-RSA
- A New Attack on RSA and CRT-RSA