نتایج جستجو برای: 9 weaknesses

تعداد نتایج: 503181  

Journal: :CoRR 2013
Gordana Rakic Zoran Budimac

In our earlier research [9] an area of consistent and systematic application of software metrics was explored. Strong dependency of applicability of software metrics on input programming language was recognized as one of the main weaknesses in this field. Introducing enriched Concrete Syntax Tree (eCST) for internal and intermediate representation of the source code resulted with step forward o...

2011
Masauso Chirwa Katarina Hjelm

......................................................................................................................................... iv INTRODUCTION ................................................................................................................................ 1 BACKGROUND ........................................................................................................

2002
Gordon Thomas Rohrmair Gavin Lowe

In this paper we will demonstrate how one can model and analyse Intrusion Detection Systems (IDSs) and their environment using the process algebra Communicating Sequential Processes (CSP) [11, 21] and its model checker FDR [9]. An Intrusion Detection System (IDS) is a system that detects abuses, misuses and unauthorised uses in a network. We show that this analysis can be used to discover two a...

2006
Mihir Bellare Thomas Ristenpart

In this paper we (1) argue the benefits of replacing the current MD transform with a multi-property-preserving domain extension transform that guarantees numerous properties of the hash function assuming they hold of the compression function; (2) provide a practical, proven-secure multi-domain extension transform suitable for use with the next generation of hash functions; (3) point to some sub...

2011
Yuechuan Wei Chao Li Bing Sun

Crypton is a 12-round block cipher proposed as an AES candidate and Crtpton v1.0 is the revised version. In this paper, we present two related-key impossible differential attacks to reduced-round Crypton and Crypton v1.0. By carefully choosing the relations of keys, constructing some 6round related-key differential trials and using some observations on the cipher, we first break 9-round Crypton...

2009
Martin Valla

............................................................................................. .........3 Introduction..................................................................................................3 Previous studies on the possible link between socioeconomic status and autism....... 4 Aims of the study...............................................................................

Journal: :Tijdschrift voor Sociale en Economische Geschiedenis/ The Low Countries Journal of Social and Economic History 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید