Showing 1 - 2 results of 2 for search '"Attacker"', query time: 0.01s Refine Results
  1. 1
    by Al-Alak, Saif M. Kh.
    Published 2014
    ... key for message ciphering that leads to the possibility of key attack. The authentication algorithm...
    Get full text
    Thesis
  2. 2
    by Harun, Nur Ziadah
    Published 2019
    ... to make multiphoton QC secure against variety types of attacks. Current authentication procedure...
    Get full text
    Thesis