-
1by Ahmad Baidowi, Zaid Mujaiyid Putra“...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...”
Published 2010
Get full text
Thesis -
2by Jantan, Mohd. Faidzal“.... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...”
Published 2010
Get full text
Thesis -
3by Abdurahim, Almabruk Shatewi“... irrespective of ‘Who’ holds the card; like a key to a door. Since an attacker can possess the card, access...”
Published 2012
Get full text
Thesis -
4by Alqahtani, Saeed Ibrahim S.“.... Attackers can seriously damage the integrity of filesystems. Attack detection is complex and time-consuming...”
Published 2009
Get full text
Thesis -
5by Saleh, Mohammed Abbas Alameen“... is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting...”
Published 2009
Get full text
Thesis -
6by Qasem, Murad Abdo Rassam“..., generally can not detect novel attacks. A method that offers a promise to solve this problem is the anomaly...”
Published 2010
Get full text
Thesis -
7by Sharifara, Ali“... quality and robustness. To evaluate the proposed technique, some attacks have been applied...”
Published 2012
Get full text
Thesis -
8by Chaeikar, Saman Shojae“... for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each...”
Published 2010
Get full text
Thesis -
9by Afrakhteh, Masoud“... to be robust against one of the common attacks to stego-images known as Chi-squared attack....”
Published 2010
Get full text
Thesis -
10by Samian, Normalia“... on, the nodes operate in promiscuous mode and are vulnerable to attacks and service disruption especially from...”
Published 2010
Get full text
Thesis -
11by Hassan Ali, Abdinasir“... of wireless communication to protect against any attack using technical approach that implements...”
Published 2010
Get full text
Thesis