-
301
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
Published 2024-01-01Subjects: Get full text
Article -
302
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01Subjects: Get full text
Article -
303
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01Subjects: Get full text
Article -
304
Key path analysis method for large-scale industrial control network
Published 2021-12-01Subjects: Get full text
Article -
305
Position related lightweight Sybil detection approach in VANET
Published 2017-04-01Subjects: “…Sybil attack…”
Get full text
Article -
306
Design and implementation of hardware-based dynamic instruction set randomization framework
Published 2017-11-01Subjects: “…code injection attack…”
Get full text
Article -
307
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Subjects: “…public key replacement attack…”
Get full text
Article -
308
Nano-zeolite-modified concrete: A comprehensive study of mechanical properties, corrosion resistance, and microstructural of concrete under varied exposure conditions
Published 2025-03-01Subjects: “…Internal and external chloride and sulphate attack…”
Get full text
Article -
309
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: “…related-key rectangle attack…”
Get full text
Article -
310
Analysis of the success probability of cube attack
Published 2012-10-01Subjects: “…cube attack…”
Get full text
Article -
311
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2025-01-01Subjects: Get full text
Article -
312
Research on HTML5 application cache poison attack
Published 2016-10-01Subjects: Get full text
Article -
313
Dual-Targeted adversarial example in evasion attack on graph neural networks
Published 2025-01-01Subjects: Get full text
Article -
314
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01Subjects: Get full text
Article -
315
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01Subjects: Get full text
Article -
316
Chosen message attacks method against ECC implementations
Published 2014-05-01Subjects: Get full text
Article -
317
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Subjects: Get full text
Article -
318
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Subjects: Get full text
Article -
319
Survey of attack graph based network security metric
Published 2018-09-01Subjects: Get full text
Article -
320
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article