Search Result Save to File Save as CSV
Your search for 12324 returns 1590 document(s)
Side-Channel attack on substitution blocks, (LNCS-Lecture Notes in Computer Science 2576) Hal 307-318
Author: Roman Novak; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A fast correlation attack for LFSR-based stream ciphers, (LNCS-Lecture Notes in Computer Science 2576) Hal 331-342
Author: Sarbani Palit; Bimal K. Roy; Arindom De; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Rectangle attack on 49-round shacal-1, (LNCS-Lecture Notes in Computer Science 2887) Hal 22-35
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protocol interactions and the chosen protocol attack, LNCS-Lecture Notes in Computer Science 1361) Hal 91-104
Author: John Kelsey; Bruce Schneier; David Wagner; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved fast correlation attack using low rate codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 67-81
Author: Havard Molland; Jaohn Erik Mathinasen, Tor Helleseth; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of denial-of service attack resistance using a real-time model checker, 159-163
Author: Tatsuya ARAI, Shin-ya NISHIZAKI; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis and Design of Distributed Simulation System for Network Attack and defense Training (V1-612 -- V1-616)
Author: Yu Song Jiong Liu Haijun Zhou Rong Zhang Wei Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next