نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

Journal: :IACR Cryptology ePrint Archive 2008
Maura B. Paterson Douglas R. Stinson

A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by Cheng and Agrawal. A feature of their scheme is that pairwise keys exist between any pair of high-level nodes (which are called cluster heads) and between any (low-level) sensor node and the nearest cluster head. We present two attacks on their scheme. The first attack can be applied for certain p...

2015
Zhang He-min Bi Guo-rong He Qiu Lin Xiang Liu Suli

BACKGROUND The aim of this study was to observe the change in plasma PPARs (peroxisome proliferator-activated receptors) level during various periods and in different subtypes in migraine patients. MATERIAL AND METHODS We divided 227 patients with migraine into 2 main groups: the attack period group (n=98) and the attack-free period group (n=129). Patients were further divided into 4 subgroup...

2018
Hiroki Kitakata Takashi Kohno Shun Kohsaka Junko Fujino Naomi Nakano Ryoma Fukuoka Shinsuke Yuasa Yuichiro Maekawa Keiichi Fukuda

OBJECTIVE To assess patient perspectives on secondary lifestyle modification and knowledge of 'heart attack' after percutaneous coronary intervention (PCI) for coronary artery disease (CAD). DESIGN Observational cross-sectional study. SETTING A single university-based hospital centre in Japan. PARTICIPANTS In total, 236 consecutive patients with CAD who underwent PCI completed a questionn...

Journal: :Journal of Systems and Software 2008
Shujun Li Chengqing Li Guanrong Chen Kwok-Tung Lo

Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyzes the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimen...

Journal: :IACR Cryptology ePrint Archive 2004
Shujun Li Chengqing Li Guanrong Chen Kwok-Tung Lo

Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyzes the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimen...

2012
Ayub Rahimzadeh Alireza Haji Ahmad Makui

Demand fluctuations in the supply chain lead to uncertainty in inventory policy and thereupon the inventory costs increase. This paper considers the impact of forecasting on the demand variation in a serial three-stage supply chain including a retailer, a manufacturer and a supplier. Four forecasting methods are considered and demand variations evaluated as bullwhip effect measure. We use analy...

2005
Gal Badishi Amir Herzberg Idit Keidar

The Internet has become a fertile ground for hostile activity. One of the simplest yet most effective attacks that can be launched over the network is a denial of service (DoS) attack. The most trivial form of a DoS attack floods the target with packets, causing congestion and consuming all available network resources. In order to employ massive attack power, the attacker usually launches a dis...

2013
DILLI KUMAR

-Security-sensitive environments defend their resources against unauthorized access by implementing access management mechanisms. Text based passwords are not secure enough for such applications. Increasing security has regularly been a problem since net and net Development came into existence, text primarily based passwords is not enough to counter such problems, that's to boot Associate in Nu...

2009
Salvador Romero Helena Vila Carmen Ferragut Pedro E. Alcaraz

The purpose of this study was to examine the power-strength curve in a half squat exercise in trained basketball players of the EBA league. For that, a cross sectional, descriptive study was carried out to 8 high-level male basketball players. After controlling the participants 1RM, a progressive test, consisted on moving loads of 30, 45, 60, 70 and 80% of 1RM as fast as possible in the concent...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید