-
61
A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy
Published 2023-09-01Subjects: Get full text
Article -
62
Investigation and analysis of the weakness and efficiency of generalized cycling attacks on RSA modulus
Published 2009-01-01Subjects: Get full text
Article -
63
Research on LEO Satellite Network Routing Security
Published 2023-06-01Subjects: Get full text
Article -
64
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01Subjects: Get full text
Article -
65
Novel method of constructing the zero-sum distinguishers
Published 2012-11-01Subjects: “…higher-order differential attack…”
Get full text
Article -
66
-
67
Mutual information power analysis attack of HMAC based on SM3
Published 2016-10-01Subjects: Get full text
Article -
68
Evaluation of Relationship between Schemas and Panic Disorder through a Case Treated with Schema Therapy
Published 2014-08-01Subjects: Get full text
Article -
69
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01Subjects: Get full text
Article -
70
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01Subjects: Get full text
Article -
71
Study on choosing the parameter ε in differential privacy
Published 2015-12-01Subjects: Get full text
Article -
72
-
73
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Subjects: Get full text
Article -
74
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: Get full text
Article -
75
-
76
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
77
Effect of carbonation curing and sodium content on geopolymer subjected to sodium and magnesium sulfate attack
Published 2025-01-01Subjects: “…sulfate attack…”
Get full text
Article -
78
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01Subjects: Get full text
Article -
79
Simple power analysis attack on random pseudo operations
Published 2012-05-01Subjects: Get full text
Article -
80