Your search for 38526 returns 2337 document(s) |
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110 |
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Rectangle attack on 49-round shacal-1, (LNCS-Lecture Notes in Computer Science 2887) Hal 22-35 |
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On a resynchronization weakness in a class of combiners with memory, (LNCS-Lecture Notes in Computer Science 2576) Hal 164-173 |
Author: Yuri Borissov; Svetla Nikova; Bart Preneel; Joos Vandewalle; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Signaling-oriented DoS attack in UMTS networks,(LNCS-Lecture Notes in Computer Science 5576) Hal. 280-289 |
Author: Georgios Kambourakis; Constantinos Kolias; Stefanos Gritzalis; and Jong Hyuk-Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316 |
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust on web browser: attack vs. defense, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-253 |
Author: Tie-Yan Li; Yongdong Wu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Side-Channel attack on substitution blocks, (LNCS-Lecture Notes in Computer Science 2576) Hal 307-318 |
Author: Roman Novak; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330 |
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A fast correlation attack for LFSR-based stream ciphers, (LNCS-Lecture Notes in Computer Science 2576) Hal 331-342 |
Author: Sarbani Palit; Bimal K. Roy; Arindom De; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protocol interactions and the chosen protocol attack, LNCS-Lecture Notes in Computer Science 1361) Hal 91-104 |
Author: John Kelsey; Bruce Schneier; David Wagner; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|