Showing 221 - 240 results of 1,198 for search '"Attacker"', query time: 0.04s Refine Results
  1. 221
    by Rezaeipour, Davood
    Published 2011
    ... ciphers. It cannot be analyzed by known cryptanalytic attacks. We study AES specifications and also...
    Get full text
    Thesis
  2. 222
    by Chizoba, Okwara Jerry
    Published 2019
    ... of the malicious attacks given serious attention as they have shown some level of complexities thereby causing...
    Get full text
    Thesis
  3. 223
    by Qasem, Murad Abdo Rassam
    Published 2010
    ..., generally can not detect novel attacks. A method that offers a promise to solve this problem is the anomaly...
    Get full text
    Thesis
  4. 224
    by Abu Bakar, Nurul Badriah
    Published 2013
    ... and unintentional attacks but the various available techniques for watermarking have yet to attain the best defence...
    Get full text
    Thesis
  5. 225
    by Nagalingam, Vanisri
    Published 2014
    ... online banking to online meeting. There are many types of online attacks and one of the famous online...
    Thesis
  6. 226
    by Mubarak, Mohd Faizal
    Published 2015
    ... of RFID system with other devices introduce security vulnerabilities which could be exploited by attackers...
    Get full text
    Thesis
  7. 227
    by Mahdi, Reyadh H
    Published 2009
    ... communications channels, and it use to avoid attack that happen on cryptography in general and on stream cipher...
    Get full text
    Get full text
    Thesis
  8. 228
    by Mohamed Yassin, Warusia
    Published 2015
    ... researchers, the low attack detection rates (also known as the detection of true positive) that reflect...
    Get full text
    Thesis
  9. 229
    by Malekzadeh, Mina
    Published 2007
    .... The lack of protection on management frames causes an intruder to launch different types of attack...
    Get full text
    Thesis
  10. 230
    by Sharabyan, Mohammad Tahghighi
    Published 2015
    ... domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack...
    Get full text
    Thesis
  11. 231
    by Wan Mohd Ruzai, Wan Nur Aqlili
    Published 2021
    ... cryptanalysis (or often called ‘attack’) against RSA and its variants are not based on this integer...
    Get full text
    Thesis
  12. 232
    by Ahmad Khalid, Shamsul Kamal
    Published 2018
    ...In today’s world, designer of a watermarking system had to constantly faced with determined attacks...
    Get full text
    Get full text
    Get full text
    Thesis
  13. 233
    by Farahpoor, Mohammadali
    Published 2014
    ... Secret Sharing and Rabin’s Information Dispersal Algorithm. One of the most dangerous attacks which can...
    Thesis
  14. 234
    ... the attacks. Physical security is the most important because it is the first layer in security. In Yemen...
    Get full text
    Thesis
  15. 235
  16. 236
    by Adenan, Nurul Nur Hanisah
    Published 2021
    ... to enhance its security. In this thesis, we present three analytical attacks on the modulus N = p 2q...
    Get full text
    Thesis
  17. 237
    ...Almost all systems all over the world suffer from outsider and insider attacks. Outsider attacks...
    Get full text
    Thesis
  18. 238
    by Chan, Gaik Yee
    Published 2012
    ... to address the problems or countermeasure the attacks occurring at the Application Layer. These ID/IP...
    Thesis
  19. 239
    by Yasir, Javed
    Published 2020
    ...). Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle...
    Get full text
    Thesis
  20. 240
    by Al Noman Ranak, Md Sayfullah
    Published 2018
    ... considerable number of attacks have been noted in the recent past. To resist these attacks, many passwords...
    Get full text
    Thesis