نتایج جستجو برای: attacking afghanistan
تعداد نتایج: 9950 فیلتر نتایج به سال:
This year the Lasker DeBakey Clinical Research Award will be shared by Brian Druker, Nicholas Lydon, and Charles Sawyers for their development of a targeted molecular therapy for treating chronic myeloid leukemia. Their work demonstrated the ability of drugs directed against cancer-causing oncogenes to turn a rapidly fatal malignancy into a manageable chronic disease.
The standard technique to attack triple encryption is the meet-in-the-middle attack which requires 2 encryption steps. In this paper, more efficient attacks are presented. One of our attacks reduces the overall number of steps to roughly 2. Other attacks optimize the number of encryptions at the cost of increasing the number of other operations. It is possible to break triple DES doing 2 single...
We explore the risk that network attackers can exploit unauthenticated Network Time Protocol (NTP) traffic to alter the time on client systems. We first discuss how an onpath attacker, that hijacks traffic to an NTP server, can quickly shift time on the server’s clients. Then, we present an extremely low-rate (single packet) denial-of-service attack that an off-path attacker, located anywhere o...
Since T. Rado in 1962 defined the busy beaver game several approaches have used computer technology to search busy beavers or even compute special values of Σ. Σ(5) is not yet known. A new approach to the computation of Σ(5) is presented, together with preliminary results, especially Σ(5)≥4098. This approach includes techniques to reduce the number of inspected Turing machines, to accelerate si...
The elliptic curve digital signature algorithm (ECDSA) is used in many devices to provide authentication. In the last few years, more and more ECDSA implementations have been proposed that allow the integration into resource-constrained devices like RFID tags. Their resistance against power-analysis attacks has not been scrutinized so far. In this article, we provide first results of power-anal...
Sima Samar had just graduated from the Kabul University School of Medicine, in 1982, when the Soviet invasion forced her to flee to central Afghanistan. "I began seeing patients immediately, but I often had to run to my book to identify symptoms and treatments, and then I had to find out whether the necessary medicine was even available. I saw women die every day because of incomplete abortion ...
Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains access of a profiling device to build a precise model which is used to attack another device in the attacking phase. Mostly, it is assumed that the attacker has unlimited capabilities in the profiling phase, whereas the attacking phase is very restricted. We step away ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید