نتایج جستجو برای: attack resistance
تعداد نتایج: 452323 فیلتر نتایج به سال:
Deep neural networks are a powerful model for feature extraction. They produce features that enable state-of-the-art performance on many tasks, including emotion categorization. However, their homogeneous representation of knowledge has made them prone to attacks, i.e., small modification in train or test data mislead the models. Emotion categorization can usually be performed either in-distrib...
Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, we have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator against the algebraic attack. In particular, we focus on the PingPong-128 stream cip...
We propose an efficient method to break H-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance).
When the body is running at fully immersed condition in viscous fluid, there are two components of resistance, i.e. frictional resistance and form drag. When it is near the free surface, the additional drag encountered to the body which is wave-making drag. This paper is presents the hydrodynamic performance of high-speed Unmanned Underwater Vehicle (UUV) in fully immersed condition. We did 100...
An experiment was conducted to test whether parasitoid resistance within a single clonal line of pea aphid (Acyrthosiphon pisum) might increase after exposure to the parasitoid wasp Aphidius ervi. Any change in resistance was expected to occur through an increase in the density of protective symbiotic bacteria rather than genetic change within the aphid or the bacterial symbiont. Six aphid line...
Recently, many identity (ID)-based user authentication and key agreement schemes for mobile client-server environment were proposed. However, these schemes are subjected to an inherent design weakness, namely, the server knows all users’ private keys. Under this problem, these schemes cannot provide insider attack resistance or mutual authentication. Furthermore, some of these schemes cannot si...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید