نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

Journal: :CoRR 2014
Vladimir Krylov Kirill Kravtsov

Denial-of-Service attacks continue to be a serious problem for the Internet community despite the fact that a large number of defense approaches has been proposed by the research community. In this paper we introduce IP Fast Hopping, easily deployable and effective network-layer architecture against DDoS attacks. Our approach also provides an easy way for clients to hide content and destination...

Journal: :Cancer discovery 2015
Antoni Ribas

UNLABELLED Adaptive immune resistance is a process in which the cancer changes its phenotype in response to a cytotoxic or proinflammatory immune response, thereby evading it. This adaptive process is triggered by the specific recognition of cancer cells by T cells, which leads to the production of immune-activating cytokines. Cancers then hijack mechanisms developed to limit inflammatory and i...

Journal: :E3S web of conferences 2021

It is necessary to reduce the effect of carbon dioxide, as failure do so will result in global warming. In this instance, researchers have begun looking for sustainable building materials. Industrial byproducts like flyash, GGBS, silica (SiO2) are used make geopolymer concrete. To produce binders alkali liquids can be react with aluminate, and activated concrete made by mixing coarse fine parti...

1998
Thomas Pornin

In recent years, three main types of attacks have been developed against Feistel-based ciphers, such as DES[1]; these attacks are linear cryptanalysis[2], differential cryptanalysis[3], and the Davies and Murphy attack[4]. Using the discrete Fourier transform, we present here a quantitative criterion of security against the Davies and Murphy attack. Similar work has been done on linear and diff...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

2011
Dang Vinh Pham Joss Wright Dogan Kesdogan

The Minimal-Hitting-Set attack (HS-attack) [10] is a well-known passive intersection attack against Mix-based anonymity systems, applicable in cases where communication behaviour is non-uniform and unknown. The attack allows an observer to identify uniquely the fixed set of communication partners of a particular user by observing the messages of all senders and receivers using a Mix. Whilst the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید