Showing 41 - 60 results of 215 for search '"Attacker"', query time: 0.05s Refine Results
  1. 41
    by Adenan, Nurul Nur Hanisah
    Published 2021
    ... to enhance its security. In this thesis, we present three analytical attacks on the modulus N = p 2q...
    Get full text
    Thesis
  2. 42
    by Ibrahim, Mohammed
    Published 2021
    ... of people’s lives. However, most IoT devices are vulnerable to botnet attacks. To defend these devices...
    Get full text
    Thesis
  3. 43
    by Omar @ Othman, Wan Zariman
    Published 2019
    ...Algebraic attacks on stream cipher are important in cryptanalysis to both design- ers...
    Get full text
    Thesis
  4. 44
    by Hydara, Isatou
    Published 2015
    ... of an application. The presence of XSS vulnerabilities in applications source codes enables XSS attacks to take...
    Get full text
    Thesis
  5. 45
    by Asmawi, Aziah
    Published 2016
    ... become increasingly vulnerable to malicious attacks that could affect essential properties...
    Get full text
    Thesis
  6. 46
    by Abdulbari Ali, Sherif
    Published 2005
    .... Attacks against simplified variants of the AES algorithm have been reported for 128-bit keys, 7 rounds...
    Get full text
    Thesis
  7. 47
    by Hamdi, Ayman Majid
    Published 2019
    ... important. Currently, static substitution boxes (S-Boxes) are vulnerable to data and subkey attacks...
    Get full text
    Thesis
  8. 48
    by Hina, Aliyu Danladi
    Published 2019
    ... against fast correlation attack, one of the major attacks known to weaken nonlinear combiner...
    Get full text
    Thesis
  9. 49
    by Juremi, Julia
    Published 2018
    ... cryptographic attacks. Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all...
    Get full text
    Thesis
  10. 50
    by Teh, Jia Yew
    Published 2017
    ... to malicious, undesirable effects such as buffer overflows, privilege escalation (spawning an attackers’ shell...
    Get full text
    Thesis
  11. 51
    by Parveen, Sajida
    Published 2016
    ... threats, one of them is spoofing attacks. A spoofing attack occurs when a person tries to masquerade...
    Get full text
    Thesis
  12. 52
    by Bakhdlaghi, Yousef Abdullah
    Published 2020
    ... the discovery of large-scale and coordinated attacks. Although existing CIDN offers consultation capability...
    Get full text
    Thesis
  13. 53
    by Mustafa, Intan Shafinaz
    Published 2006
    ...) open to the potential attacks during transmission. Recipients required a mechanism which can prove...
    Get full text
    Thesis
  14. 54
    by Dhahir, Saif Mahmood
    Published 2017
    ..., dynamic, infrastructure-less and self-organizing, MANETs are vulnerable to several kinds of attacks...
    Get full text
    Thesis
  15. 55
    by Ahmad, Miza Mumtaz
    Published 2011
    ... is close to nil. However, it is easier to attack the key generation protocol using less complicated attack...
    Get full text
    Thesis
  16. 56
    by Yaseen, Ahmed Hasani
    Published 2020
    ... the functional strategies (i.e. acclaim, attack, and defence that are based on topics) which are used by both...
    Get full text
    Thesis
  17. 57
    by Lam, Shi Xiang
    Published 2013
    ... diferent types of attack, namely attack based on removal of vertices from the network and attack...
    Get full text
    Thesis
  18. 58
    by Ahmad Ghazali, Lizal Iswady
    Published 2012
    ... result, it is vulnerable to Eavesdropping attack. This leads many works on practical protocol...
    Get full text
    Thesis
  19. 59
    by Al-Alak, Saif M. Kh.
    Published 2014
    ... key for message ciphering that leads to the possibility of key attack. The authentication algorithm...
    Get full text
    Thesis
  20. 60
    by Mushgil, Baydaa Mohammad
    Published 2016
    ... signal processing and manipulating attacks specially the de-synchronization attacks such as jittering...
    Get full text
    Thesis