Showing 21 - 40 results of 3,648 for search '"Attacker"', query time: 0.04s Refine Results
  1. 21

    Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks by Yang Lu, Jiguo Li

    Published 2014-01-01
    “…We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. …”
    Get full text
    Article
  2. 22

    Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality by Biying Fu, Naser Damer

    Published 2022-09-01
    “…Abstract Morphing attacks are a form of presentation attacks that gathered increasing attention in recent years. …”
    Get full text
    Article
  3. 23
  4. 24
  5. 25

    Research and simulation of timing attacks on ECC by Hui-hui JIA, Chao WANG, Jian GU, Hao-hao SONG, Di TANG

    Published 2016-04-01
    Subjects: “…side channel attack…”
    Get full text
    Article
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30

    An Adversarial Attack via Penalty Method by Jiyuan Sun, Haibo Yu, Jianjun Zhao

    Published 2025-01-01
    Subjects: “…Adversarial attack…”
    Get full text
    Article
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40

    Detecting LDoS attack based on ASPQ by Jing ZHANG, Hua-ping HU, Bo LIU, Feng-tao XIAO

    Published 2012-05-01
    “…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
    Get full text
    Article