-
101
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01Subjects: Get full text
Article -
102
Multi-point joint power analysis attack against AES
Published 2016-10-01Subjects: “…multi-point joint power analysis attack…”
Get full text
Article -
103
-
104
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: Get full text
Article -
105
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Subjects: Get full text
Article -
106
Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
Published 2008-01-01Subjects: Get full text
Article -
107
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: Get full text
Article -
108
Dynamic and heterogeneous Byzantine system in cloud
Published 2018-05-01Subjects: Get full text
Article -
109
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article -
110
Novel blind audio watermarking algorithm in the hybrid domain
Published 2007-01-01Subjects: Get full text
Article -
111
DAGUARD: distributed backdoor attack defense scheme under federated learning
Published 2023-05-01Subjects: Get full text
Article -
112
Adversarial sample generation algorithm for vertical federated learning
Published 2023-08-01Subjects: Get full text
Article -
113
Resilience characterization and evaluation model of field area network for the power distribution network
Published 2022-09-01Subjects: Get full text
Article -
114
Application of adversarial machine learning in network intrusion detection
Published 2021-11-01Subjects: Get full text
Article -
115
Information flow integrity measurement method using integrity threat tree
Published 2019-04-01Subjects: Get full text
Article -
116
Security risk analysis and evaluation techniques in power information system cloud
Published 2018-02-01Subjects: Get full text
Article -
117
Grey evaluation model and algorithm of network attack effectiveness
Published 2009-01-01Subjects: “…attack effectiveness…”
Get full text
Article -
118
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01Subjects: Get full text
Article -
119
Optimal path identification to defend against DDoS attacks
Published 2008-01-01Subjects: Get full text
Article -
120
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article