-
421
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
Published 2011-01-01Subjects: Get full text
Article -
422
Research on active defense based on multi-stage cyber deception game
Published 2020-08-01Subjects: “…cyber attack and defense…”
Get full text
Article -
423
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01Subjects: “…difference enumeration attack…”
Get full text
Article -
424
Research on the SQL injection filtering based on SQL syntax tree
Published 2016-11-01Subjects: “…SQL injection attack…”
Get full text
Article -
425
Deep patch‐wise supervision for presentation attack detection
Published 2022-09-01Subjects: Get full text
Article -
426
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Subjects: Get full text
Article -
427
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01Subjects: Get full text
Article -
428
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
Published 2013-11-01Subjects: “…multi-step attack pattern…”
Get full text
Article -
429
New related-key rectangle attack on 42-round SHACAL-2
Published 2009-01-01Subjects: Get full text
Article -
430
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
Published 2024-01-01Subjects: Get full text
Article -
431
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01Subjects: Get full text
Article -
432
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01Subjects: Get full text
Article -
433
Key path analysis method for large-scale industrial control network
Published 2021-12-01Subjects: Get full text
Article -
434
Position related lightweight Sybil detection approach in VANET
Published 2017-04-01Subjects: “…Sybil attack…”
Get full text
Article -
435
Design and implementation of hardware-based dynamic instruction set randomization framework
Published 2017-11-01Subjects: “…code injection attack…”
Get full text
Article -
436
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Subjects: “…public key replacement attack…”
Get full text
Article -
437
Nano-zeolite-modified concrete: A comprehensive study of mechanical properties, corrosion resistance, and microstructural of concrete under varied exposure conditions
Published 2025-03-01Subjects: “…Internal and external chloride and sulphate attack…”
Get full text
Article -
438
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: “…related-key rectangle attack…”
Get full text
Article -
439
Analysis of the success probability of cube attack
Published 2012-10-01Subjects: “…cube attack…”
Get full text
Article -
440
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2025-01-01Subjects: Get full text
Article