-
21by Adnan, Ali Idarous“... that intend to prevent routing attacks. Although, WSNs have been used in many sensitive applications...”
Published 2017
Get full text
Thesis -
22by Mahfoudh, Asma“... techniques satisfy all obfuscation effectiveness criteria to resist the attack of Reverse Engineering...”
Published 2019
Get full text
Thesis -
23by Ahmad Zawawi, Md. Nabil“... the threats of an active attack by an active warden in which the robustness of the stegoobject is concerned...”
Published 2006
Get full text
Thesis -
24by Zare Anari, Abbas Mehdizadeh“... to detect or prevent an attacker which tampers against data. In this thesis, focus is given on Mobile IPv6...”
Published 2008
Get full text
Thesis -
25by Mustafa, Ahmed Sudad“... when a route is requested. However, AODV suffers severely from the black hole attacks where...”
Published 2017
Get full text
Thesis -
26by Memari, Nogol“.../identified/reported vulnerabilities. In case of zero day attacks, things may go unidentified for quite a long...”
Published 2014
Get full text
Thesis -
27by Uwadiegwu, Inyama Victor“... there is inadequate security mechanism which an intruder or a man in the middle (MITM) attack can capture...”
Published 2019
Get full text
Thesis -
28by Munther, Munther Numan“... and attackers can easily exploit the inherent security limitation of ARP working principle to penetrate...”
Published 2018
Get full text
Thesis -
29by Hasheminejad, Hamidreza“..., computer worms and viruses in the cyberworld. In order to prevent these attacks, technologies...”
Published 2015
Get full text
Thesis -
30by Wong, Tze Jin“.... In this research, numerous mathematical attacks will be analyzed with the cryptosystem and compared with RSA. LUC...”
Published 2011
Get full text
Thesis -
31by Abd Ghafar, Amir Hamzah“... of the cryptosystem. Most cryptanalysis or commonly called ‘attacks’ upon RSA focuses on solving the IFP in feasible...”
Published 2020
Get full text
Thesis -
32by Abd Ghafar, Amir Hamzah“...This study has two main parts. The first part discusses side-channel attack on the AAb cryptosystem...”
Published 2015
Get full text
Thesis -
33by Mandangan, Arif“... cryptosystem was successfully attacked by the passive adversary attack. This attack is manipulating...”
Published 2011
Get full text
Thesis -
34by Hussien, Al-Abadi Hassan Mansur“... forms of attacks especially in relatedkey model attacks. These days, the most common block cipher...”
Published 2017
Get full text
Thesis -
35by Abdulkader, Zaid A.“... if it undergoes attack. To do this, it must use alternative mechanisms while making sure that it does not affect...”
Published 2018
Get full text
Thesis -
36by Rezaeipour, Davood“... ciphers. It cannot be analyzed by known cryptanalytic attacks. We study AES specifications and also...”
Published 2011
Get full text
Thesis -
37by Mohamed Yassin, Warusia“... researchers, the low attack detection rates (also known as the detection of true positive) that reflect...”
Published 2015
Get full text
Thesis -
38by Malekzadeh, Mina“.... The lack of protection on management frames causes an intruder to launch different types of attack...”
Published 2007
Get full text
Thesis -
39by Sharabyan, Mohammad Tahghighi“... domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack...”
Published 2015
Get full text
Thesis -
40by Wan Mohd Ruzai, Wan Nur Aqlili“... cryptanalysis (or often called ‘attack’) against RSA and its variants are not based on this integer...”
Published 2021
Get full text
Thesis