Showing 1,841 - 1,860 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1841

    Agroterrorism in the U.S.: An Overview by Renee M. Goodrich, Keith R. Schneider, C. D. Webb, Douglas L. Archer

    Published 2005-10-01
    “… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. …”
    Get full text
    Article
  2. 1842

    L’ennemi dans l’après-guerre espagnole, 1939-1945 by Javier Domínguez Arribas

    Published 2017-12-01
    “…Surprisingly, the enemies that were actually hit by the bloodiest repression –the “reds”– were not always those who received the worst attacks in propaganda. Finally, an interpretation of the functions played by the enemy’s representation within the Francoist system is proposed.…”
    Get full text
    Article
  3. 1843

    Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method by Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang

    Published 2025-01-01
    “…Abstract We present practical attacks on IAR-CTR and IAR-CFB, AE modes proposed by Hwang and Gope to offer both privacy and authenticity in a single pass. …”
    Get full text
    Article
  4. 1844

    Redbay Ambrosia Beetle-Laurel Wilt Pathogen: A Potential Major Problem for the Florida Avocado Industry by Jonathan H. Crane, Jorge E. Peña, J. L. Osborne

    Published 2008-02-01
    “…Osborne, describes this insect-fungal pest attacking woody plants in the laurel family, including avocado. …”
    Get full text
    Article
  5. 1845

    A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes by Chemlal Abdelhakim, Tabti Hassan, El Bourakkadi Hamid, Abid Abdellah, Jarjar Abdellatif, Benazzi Abdelhamid

    Published 2025-01-01
    “…Simulations conducted on an arbitrary selection of images from a database demonstrate that our system can withstand all known attacks.…”
    Get full text
    Article
  6. 1846

    Analysis and thought on quantum insert technology by Xue-bo ZHANG, Si WANG, Hong-xia ZOU

    Published 2017-08-01
    “…Quantum insert (QI) is a technology that makes redirection attacks by injecting malicious content into certain sessions.A brief introduction of American “Quantum Insert” project was given and the connotation of this technology was discussed.It then looked into the application that quantum insert was put to in the Internet “Great Cannon” event.An open source QI tool made available by Fox IT,an IT security company,was then analyzed.An experimental verification environment was built using this tool and a verification was made.Finally,a thought was given on how to put QI to use in building network defense.…”
    Get full text
    Article
  7. 1847

    Research on dynamic array honeypot for collaborative network defense strategy by Le-yi SHI, Jie LI, Xin LIU, Chun-fu JIA

    Published 2012-11-01
    “…Inspired by the ancient battle diagram for military purpose,a concept of dynamic array honeypot was proposed to bewilder the attackers by coordinating and changing the role pseudo-randomly as a huge dynamic puzzle.The dynamic array honeypot model was presented,system simulation through NS2 was performed,and the prototype implementation with Java was carried out.Detailed empirical studies were launched upon both the simulation model and the prototype.The simulation results demonstrates that the dynamic array honeypot system is feasible and effective for active network confrontation.…”
    Get full text
    Article
  8. 1848

    Agroterrorism in the U.S.: An Overview by Renee M. Goodrich, Keith R. Schneider, C. D. Webb, Douglas L. Archer

    Published 2005-10-01
    “… Since the attacks of 9/11, vulnerabilities of the nation's infrastructure have been analyzed and discussed. …”
    Get full text
    Article
  9. 1849

    Improvement and formal proof on protocol Otway-Rees by Lai-feng LU, Xin-dong DUAN, Jian-feng MA

    Published 2012-09-01
    “…Choosing the authentication key distribution protocol Otway-Rees as the research object,using protocol composition logic (PCL) as proof tool,the security protocol analysis and formal proof was studied.Firstly,this paper gave the forms of security attack,analyzed the Otway-Rees defects and put forward the amended protocol (named as AOR protocol).Then,PCL was extended.And then PCL was used to describe and prove the behavior of each entity and the safety of the protocol attribute formally.Finally,the conclusion was given that the amended AOR protocol has the security attribute of key confidentiality.…”
    Get full text
    Article
  10. 1850

    Provable secure trusted protocol for network storage by DUAN Xin-dong, MA Jian-feng

    Published 2011-01-01
    “…A provable secure trusted protocol for NASD was proposed.The protocol will achieve authentication,key agreement and secure channel within two rounds among the server,the disks and the user.At the same time,the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction,which would improve the efficiency of the protocol,and prevent the server from malicious attacks effectively.The analysis results show that the protocol is SK-secure by using CK model,which would increase the data confidentiality,integrity and no repudiation.…”
    Get full text
    Article
  11. 1851

    Secure network coding scheme for scalable video streaming by Xi-meng LIU, Guang-jun LIU, Jian-feng MA, Jin-bo XIONG

    Published 2013-05-01
    “…With the purpose to achieve hierarchical security levels for scalable video streaming in heterogeneous net-works,random function was used to randomize parts of the video streaming in each layer.Network coding scheme was also used to resist known-plaintext attacks.Moreover,network encoder was studied.Ordered random linear network en-coder was designed for scalable video transmission.It could achieve scalability in security levels with few random opera-tions and reduce communication overhead.Analysis shows that the scheme could effectively increase the network throughput.…”
    Get full text
    Article
  12. 1852

    Detection of T91 Steel Corrosion with a Fe3+-Enhanced Fluorescence Probe by Tie Feng Xia, Li Zhang, Da Quan Zhang, Li Xin Gao

    Published 2015-01-01
    “…The varying of fluorescence intensity is linked to that of weight-loss of T91 steel. Early attack on T91 steel was detected using fluorescence microscopy. …”
    Get full text
    Article
  13. 1853

    Research on the data link layer secure protocol of TES network based on ECC by WU Zhi-jun, KAN Hong-tao

    Published 2009-01-01
    “…A workable and efficient data link layer security protocol had been proposed on the need of safety information transfer requirements of the TES system.The protocol provides a software registration solution for the remote sites and a information encryption method base on the elliptic curves cryptography(ECC) algorithm as well as a combined key allocation method.The protocol takes the characters of the TES system into account,improves its ability to identify remote sites,and provides ways to prevent information stealing and network attacks.…”
    Get full text
    Article
  14. 1854

    Application progress of SGX in trusted computing area by Bo ZHAO, Anqi YUAN, Yang AN

    Published 2021-12-01
    “…The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX were introduced, the research status of SGX in the field of trusted computing were analyzed.Then, sorted out the current application difficulties and solutions of SGX were sorted out and compared with other trusted computing technologies.Finally, SGX technology development direction in the field of trusted computing was discussed.…”
    Get full text
    Article
  15. 1855

    L’ennemi dans l’après-guerre espagnole, 1939-1945 by Javier Domínguez Arribas

    Published 2018-07-01
    “…Surprisingly, the enemies that were actually hit by the bloodiest repression –the “reds”– were not always those who received the worst attacks in propaganda. Finally, an interpretation of the functions played by the enemy’s representation within the Francoist system is proposed.…”
    Get full text
    Article
  16. 1856

    Finding Galictis cuja (Molina, 1782) (Carnivora, Mustelidae) at a northern Chilean site in the potential distribution area of the species by Pablo Valladares-Faúndez, Francesco Canepa, Constanza Rubilar Ordoñez, Nicole Álvarez-Henríquez

    Published 2025-01-01
    “…We present the first finding of Galictis cuja in the northern desert of Tarapaca region, Chile, apparently attacked and killed by dogs, which indicates an expansion of its distribution range and the utilization of microhabitats.…”
    Get full text
    Article
  17. 1857

    Identity-based anonymity authentication protocol in the heterogeneous wireless network by HOU Hui-fang1, JI Xin-sheng2, LIU Guang-qiang1

    Published 2011-01-01
    “…Aiming at the security of authentication protocol for heterogeneous wireless network,a mutual authentication and key agreement protocol,which was based on CPK algorithm and improved ECDH algorithm,was proposed.The temporary authentication identity and temporary communication identity was adopted to realize user identity anonymity.The ordered pair of temporary communication identity was proposed to prevent replay attack in the process of re-authentication.The risk of key compromise was also avoided in the proposed protocol.By security analysis,this protocol had the security properties such as identity authentication,key security and anonymity.…”
    Get full text
    Article
  18. 1858

    Agroterrorism in the U.S.: An Overview by Renée M. Goodrich Schneider, Keith R. Schneider, C. D. Webb, Mike Hubbard, Douglas L. Archer

    Published 2009-06-01
    “…Archer, discusses the use of biological agents in a deliberate, harmful attack, or terrorism using the weapons of biological warfare against the U.S. agricultural and food processing system. …”
    Get full text
    Article
  19. 1859

    Robust image hiding algorithm for secure multimodal biometrics by Yu-qiang CAO, Wei-guo GONG, Sen BAI

    Published 2016-09-01
    “…In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.…”
    Get full text
    Article
  20. 1860

    Agroterrorism in the U.S.: An Overview by Renée M. Goodrich Schneider, Keith R. Schneider, C. D. Webb, Mike Hubbard, Douglas L. Archer

    Published 2009-06-01
    “…Archer, discusses the use of biological agents in a deliberate, harmful attack, or terrorism using the weapons of biological warfare against the U.S. agricultural and food processing system. …”
    Get full text
    Article