Search Result Save to File Save as CSV
Your search for 42175 returns 3663 document(s)
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved fast correlation attack using low rate codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 67-81
Author: Havard Molland; Jaohn Erik Mathinasen, Tor Helleseth; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Signaling-oriented DoS attack in UMTS networks,(LNCS-Lecture Notes in Computer Science 5576) Hal. 280-289
Author: Georgios Kambourakis; Constantinos Kolias; Stefanos Gritzalis; and Jong Hyuk-Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Attack pattern discovery by frequent episodes mining from honeypot systems, (LNCS-Lecture Notes in Computer Science 5576) Hal. 301-316
Author: Ming Yang Su, Kai Chi Chang; Chun-Yuen Lin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trust on web browser: attack vs. defense, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-253
Author: Tie-Yan Li; Yongdong Wu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Side-Channel attack on substitution blocks, (LNCS-Lecture Notes in Computer Science 2576) Hal 307-318
Author: Roman Novak; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A fast correlation attack for LFSR-based stream ciphers, (LNCS-Lecture Notes in Computer Science 2576) Hal 331-342
Author: Sarbani Palit; Bimal K. Roy; Arindom De; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next