نتایج جستجو برای: attacks on humans
تعداد نتایج: 8507657 فیلتر نتایج به سال:
mobile ad-hoc networks (manets) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. in this paper, two methods proposed for dynamic anom...
Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, diicult to memorize for humans. Bellovin and Merritt 4] proposed \encrypted key exchange" (EKE) protocols, to frustrate key-guessing attacks. EKE requires the use of asymmetric cryptosystems and is based on encrypting the public key, using a symmetri...
Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, diicult to memorize for humans. Bellovin and Merritt 4] proposed \encrypted key exchange" (EKE) protocols, to frustrate key-guessing attacks. EKE requires the use of asymmetric cryptosystems and is based on encrypting the public key, using a symmetri...
With the expected introduction of robots into our daily lives, providing mechanisms to avoid undesired attacks and exploits in robot communication software is becoming increasingly required. Just as during the beginnings of the computer age (Pfleeger and Pfleeger, 2002), robotics is established in a “happy naivety,” where security rules against external attacks are not adopted, assuming that ro...
StreamHash 2 is a hash function proposed by Michał Trojnara at the Cryptography and Security Systems in 2011 Conference. This algorithm is a member of StreamHash family which was first introduced in 2008 during the SHA-3 Competition. In this paper we will show collision attacks on the internal state of the StreamHash 2 hash function with complexity about 2 for the 32n-bit version of the algorit...
We describe a new attack on the Search Ring Learning-With-Errors (RLWE) problem based on the chi-square statistical test, and give examples of RLWE instances in Galois number fields which are vulnerable to our attack. We prove a search-to-decision reduction for Galois fields which applies for any unramified prime modulus q, regardless of the residue degree f of q, and we use this in our attacks...
In previous papers (3) I have had occasion, in talking of the psychotic part of the personality, to speak of the destructive attacks which the patient makes on anything which is felt to have the function of linking one object with another. It is my intention in this paper to show the significance of this form of destructive attack in the production of some symptoms met with in borderline psycho...
Digital watermarking is used for the copyright protection of multimedia documents like image. One problem in it is the desynchronization attacks of the watermark at the receiver. Here a channel model for watermark reception with non perfect synchronization is introduced. Under the given channel model the capacity of SCS water marking and imperfectly synchronized reception is derived. One import...
This paper discusses the Cube attacks proposed in [1] applied to Trivium. Independent verification of the equations given in [1] were carried out. Experimentation showed that the precomputed equations were not general. They are correct when applied to the class of IVs for which they were computed where IV bits at locations other than those corresponding to the cube are fixed at 0. When these IV...
A new type of attack on Message Authentication Codes (MACs) is introduced which takes advantage of possible weaknesses in interfaces to hardware security modules. In particular, if a module does not fix the degree of MAC truncation employed, then potentially serious attacks are possible.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید