Showing 21 - 40 results of 215 for search '"Attacker"', query time: 0.04s Refine Results
  1. 21
    by Adnan, Ali Idarous
    Published 2017
    ... that intend to prevent routing attacks. Although, WSNs have been used in many sensitive applications...
    Get full text
    Thesis
  2. 22
    by Mahfoudh, Asma
    Published 2019
    ... techniques satisfy all obfuscation effectiveness criteria to resist the attack of Reverse Engineering...
    Get full text
    Thesis
  3. 23
    by Ahmad Zawawi, Md. Nabil
    Published 2006
    ... the threats of an active attack by an active warden in which the robustness of the stegoobject is concerned...
    Get full text
    Thesis
  4. 24
    by Zare Anari, Abbas Mehdizadeh
    Published 2008
    ... to detect or prevent an attacker which tampers against data. In this thesis, focus is given on Mobile IPv6...
    Get full text
    Thesis
  5. 25
    by Mustafa, Ahmed Sudad
    Published 2017
    ... when a route is requested. However, AODV suffers severely from the black hole attacks where...
    Get full text
    Thesis
  6. 26
    by Memari, Nogol
    Published 2014
    .../identified/reported vulnerabilities. In case of zero day attacks, things may go unidentified for quite a long...
    Get full text
    Thesis
  7. 27
    by Uwadiegwu, Inyama Victor
    Published 2019
    ... there is inadequate security mechanism which an intruder or a man in the middle (MITM) attack can capture...
    Get full text
    Thesis
  8. 28
    by Munther, Munther Numan
    Published 2018
    ... and attackers can easily exploit the inherent security limitation of ARP working principle to penetrate...
    Get full text
    Thesis
  9. 29
    by Hasheminejad, Hamidreza
    Published 2015
    ..., computer worms and viruses in the cyberworld. In order to prevent these attacks, technologies...
    Get full text
    Thesis
  10. 30
    by Wong, Tze Jin
    Published 2011
    .... In this research, numerous mathematical attacks will be analyzed with the cryptosystem and compared with RSA. LUC...
    Get full text
    Thesis
  11. 31
    by Abd Ghafar, Amir Hamzah
    Published 2020
    ... of the cryptosystem. Most cryptanalysis or commonly called ‘attacks’ upon RSA focuses on solving the IFP in feasible...
    Get full text
    Thesis
  12. 32
    by Abd Ghafar, Amir Hamzah
    Published 2015
    ...This study has two main parts. The first part discusses side-channel attack on the AAb cryptosystem...
    Get full text
    Thesis
  13. 33
    by Mandangan, Arif
    Published 2011
    ... cryptosystem was successfully attacked by the passive adversary attack. This attack is manipulating...
    Get full text
    Thesis
  14. 34
    ... forms of attacks especially in relatedkey model attacks. These days, the most common block cipher...
    Get full text
    Thesis
  15. 35
    by Abdulkader, Zaid A.
    Published 2018
    ... if it undergoes attack. To do this, it must use alternative mechanisms while making sure that it does not affect...
    Get full text
    Thesis
  16. 36
    by Rezaeipour, Davood
    Published 2011
    ... ciphers. It cannot be analyzed by known cryptanalytic attacks. We study AES specifications and also...
    Get full text
    Thesis
  17. 37
    by Mohamed Yassin, Warusia
    Published 2015
    ... researchers, the low attack detection rates (also known as the detection of true positive) that reflect...
    Get full text
    Thesis
  18. 38
    by Malekzadeh, Mina
    Published 2007
    .... The lack of protection on management frames causes an intruder to launch different types of attack...
    Get full text
    Thesis
  19. 39
    by Sharabyan, Mohammad Tahghighi
    Published 2015
    ... domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack...
    Get full text
    Thesis
  20. 40
    by Wan Mohd Ruzai, Wan Nur Aqlili
    Published 2021
    ... cryptanalysis (or often called ‘attack’) against RSA and its variants are not based on this integer...
    Get full text
    Thesis