Showing 1 - 11 results of 11 for search '"Attacker"', query time: 0.02s Refine Results
  1. 1
    ...Plaintext Recovery Attack is a new attack in security system world. It was discovered lately...
    Get full text
    Thesis
  2. 2
    by Jantan, Mohd. Faidzal
    Published 2010
    .... Far from that, Algebraic Attacks and Fast Algebraic Attack has become popular among cryptographers...
    Get full text
    Thesis
  3. 3
    by Abdurahim, Almabruk Shatewi
    Published 2012
    ... irrespective of ‘Who’ holds the card; like a key to a door. Since an attacker can possess the card, access...
    Get full text
    Thesis
  4. 4
    by Alqahtani, Saeed Ibrahim S.
    Published 2009
    .... Attackers can seriously damage the integrity of filesystems. Attack detection is complex and time-consuming...
    Get full text
    Thesis
  5. 5
    by Saleh, Mohammed Abbas Alameen
    Published 2009
    ... is considered not reliable anymore because of its data that can be tampered with by an attacker after conducting...
    Get full text
    Thesis
  6. 6
    by Qasem, Murad Abdo Rassam
    Published 2010
    ..., generally can not detect novel attacks. A method that offers a promise to solve this problem is the anomaly...
    Get full text
    Thesis
  7. 7
    by Sharifara, Ali
    Published 2012
    ... quality and robustness. To evaluate the proposed technique, some attacks have been applied...
    Get full text
    Thesis
  8. 8
    by Chaeikar, Saman Shojae
    Published 2010
    ... for generating, distributing, and finally revoking keys. Many attacks endanger security of key management in each...
    Get full text
    Thesis
  9. 9
    by Afrakhteh, Masoud
    Published 2010
    ... to be robust against one of the common attacks to stego-images known as Chi-squared attack....
    Get full text
    Thesis
  10. 10
    by Samian, Normalia
    Published 2010
    ... on, the nodes operate in promiscuous mode and are vulnerable to attacks and service disruption especially from...
    Get full text
    Thesis
  11. 11
    by Hassan Ali, Abdinasir
    Published 2010
    ... of wireless communication to protect against any attack using technical approach that implements...
    Get full text
    Thesis