gout109 发表于 2025-3-25 04:58:36

https://doi.org/10.1007/978-3-319-05149-9anomaly detection; cryptography; denial of service attacks; intrusion detection; mobile security

Mindfulness 发表于 2025-3-25 09:38:28

LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processorseral-purpose processors. Our experiments show that LEA is faster than AES on Intel, AMD, ARM, and ColdFire platforms. LEA can be also implemented to have tiny code size. Its hardware implementation has a competitive throughput per area. It is secure against all the existing attacks on block ciphers.

Antarctic 发表于 2025-3-25 12:03:54

Some New Weaknesses in the RC4 Stream Cipheroretical proof of this bias. This bias immediately provide distinguisher for RC4, and ciphertext only attack on broadcast RC4. Additionally, we discover some new weaknesses of the keystream bytes even after the first . rounds of the PRGA, where . is the size of the RC4 permutation, generally, .. The

皱痕 发表于 2025-3-25 16:22:03

http://reply.papertrans.cn/47/4653/465282/465282_24.png

habitat 发表于 2025-3-25 21:54:08

A General Method to Evaluate the Correlation of Randomness Tests tests. Firstly, we deduce the distribution that independent randomness tests should obey, then evaluate whether the randomness tests are independent or not based on hypothesis test. Using this method, we research the correlation of some statistical tests included in the NIST SP 800-22 suits, which

craving 发表于 2025-3-26 00:25:45

http://reply.papertrans.cn/47/4653/465282/465282_26.png

删减 发表于 2025-3-26 04:40:35

Dynamic Surveillance: A Case Study with Enron Email Data Setgn stronger anonymity algorithms, this paper addresses the general impact of limited resource on surveillance efficiency. The general impact of limited resource on identifying a hidden group is experimentally studied; the task of identification is only done by following communications between suspec

不再流行 发表于 2025-3-26 11:36:54

http://reply.papertrans.cn/47/4653/465282/465282_28.png

chastise 发表于 2025-3-26 12:46:51

http://reply.papertrans.cn/47/4653/465282/465282_29.png

induct 发表于 2025-3-26 19:34:40

Bifocals: Analyzing WebView Vulnerabilities in Android Applicationsb content. While this rich interaction simplifies developer support for multiple platforms, it exposes applications to attack. In this paper, we explore two WebView vulnerabilities: ., where malicious JavaScript can invoke Android application code, and ., which exposes a device’s file system to an a
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security Applications; 14th International W Yongdae Kim,Heejo Lee,Adrian Perrig Conference proceedings 2014 Springer Internatio