找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Applications; 14th International W Yongdae Kim,Heejo Lee,Adrian Perrig Conference proceedings 2014 Springer Internatio

[复制链接]
楼主: 手套
发表于 2025-3-25 04:58:36 | 显示全部楼层
https://doi.org/10.1007/978-3-319-05149-9anomaly detection; cryptography; denial of service attacks; intrusion detection; mobile security
发表于 2025-3-25 09:38:28 | 显示全部楼层
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processorseral-purpose processors. Our experiments show that LEA is faster than AES on Intel, AMD, ARM, and ColdFire platforms. LEA can be also implemented to have tiny code size. Its hardware implementation has a competitive throughput per area. It is secure against all the existing attacks on block ciphers.
发表于 2025-3-25 12:03:54 | 显示全部楼层
Some New Weaknesses in the RC4 Stream Cipheroretical proof of this bias. This bias immediately provide distinguisher for RC4, and ciphertext only attack on broadcast RC4. Additionally, we discover some new weaknesses of the keystream bytes even after the first . rounds of the PRGA, where . is the size of the RC4 permutation, generally, .. The
发表于 2025-3-25 16:22:03 | 显示全部楼层
发表于 2025-3-25 21:54:08 | 显示全部楼层
A General Method to Evaluate the Correlation of Randomness Tests tests. Firstly, we deduce the distribution that independent randomness tests should obey, then evaluate whether the randomness tests are independent or not based on hypothesis test. Using this method, we research the correlation of some statistical tests included in the NIST SP 800-22 suits, which
发表于 2025-3-26 00:25:45 | 显示全部楼层
发表于 2025-3-26 04:40:35 | 显示全部楼层
Dynamic Surveillance: A Case Study with Enron Email Data Setgn stronger anonymity algorithms, this paper addresses the general impact of limited resource on surveillance efficiency. The general impact of limited resource on identifying a hidden group is experimentally studied; the task of identification is only done by following communications between suspec
发表于 2025-3-26 11:36:54 | 显示全部楼层
发表于 2025-3-26 12:46:51 | 显示全部楼层
发表于 2025-3-26 19:34:40 | 显示全部楼层
Bifocals: Analyzing WebView Vulnerabilities in Android Applicationsb content. While this rich interaction simplifies developer support for multiple platforms, it exposes applications to attack. In this paper, we explore two WebView vulnerabilities: ., where malicious JavaScript can invoke Android application code, and ., which exposes a device’s file system to an a
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 22:31
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表