-
41by Adenan, Nurul Nur Hanisah“... to enhance its security. In this thesis, we present three analytical attacks on the modulus N = p 2q...”
Published 2021
Get full text
Thesis -
42by Ibrahim, Mohammed“... of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices...”
Published 2021
Get full text
Thesis -
43by Omar @ Othman, Wan Zariman“...Algebraic attacks on stream cipher are important in cryptanalysis to both design- ers...”
Published 2019
Get full text
Thesis -
44by Hydara, Isatou“... of an application. The presence of XSS vulnerabilities in applications source codes enables XSS attacks to take...”
Published 2015
Get full text
Thesis -
45by Asmawi, Aziah“... become increasingly vulnerable to malicious attacks that could affect essential properties...”
Published 2016
Get full text
Thesis -
46by Abdulbari Ali, Sherif“.... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...”
Published 2005
Get full text
Thesis -
47by Hamdi, Ayman Majid“... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...”
Published 2019
Get full text
Thesis -
48by Hina, Aliyu Danladi“... against fast correlation attack, one of the major attacks known to weaken nonlinear combiner...”
Published 2019
Get full text
Thesis -
49by Juremi, Julia“... cryptographic attacks. Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all...”
Published 2018
Get full text
Thesis -
50by Teh, Jia Yew“... to malicious, undesirable effects such as buffer overflows, privilege escalation (spawning an attackers’ shell...”
Published 2017
Get full text
Thesis -
51by Parveen, Sajida“... threats, one of them is spoofing attacks. A spoofing attack occurs when a person tries to masquerade...”
Published 2016
Get full text
Thesis -
52by Bakhdlaghi, Yousef Abdullah“... the discovery of large-scale and coordinated attacks. Although existing CIDN offers consultation capability...”
Published 2020
Get full text
Thesis -
53by Mustafa, Intan Shafinaz“...) open to the potential attacks during transmission. Recipients required a mechanism which can prove...”
Published 2006
Get full text
Thesis -
54by Dhahir, Saif Mahmood“..., dynamic, infrastructure-less and self-organizing, MANETs are vulnerable to several kinds of attacks...”
Published 2017
Get full text
Thesis -
55by Ahmad, Miza Mumtaz“... is close to nil. However, it is easier to attack the key generation protocol using less complicated attack...”
Published 2011
Get full text
Thesis -
56by Yaseen, Ahmed Hasani“... the functional strategies (i.e. acclaim, attack, and defence that are based on topics) which are used by both...”
Published 2020
Get full text
Thesis -
57by Lam, Shi Xiang“... diferent types of attack, namely attack based on removal of vertices from the network and attack...”
Published 2013
Get full text
Thesis -
58by Ahmad Ghazali, Lizal Iswady“... result, it is vulnerable to Eavesdropping attack. This leads many works on practical protocol...”
Published 2012
Get full text
Thesis -
59by Al-Alak, Saif M. Kh.“... key for message ciphering that leads to the possibility of key attack. The authentication algorithm...”
Published 2014
Get full text
Thesis -
60by Mushgil, Baydaa Mohammad“... signal processing and manipulating attacks specially the de-synchronization attacks such as jittering...”
Published 2016
Get full text
Thesis