Results 91 to 100 of about 10,650 (191)

A two‐step authentication framework for Mobile ad hoc networks [PDF]

open access: yes, 2007
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C.   +2 more
core  

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj   +1 more source

Biological Terrorism, Emerging Diseases, and National Security [PDF]

open access: yes, 1998
Examines the extent to which bioterrorist attacks have proven or may prove difficult to distinguish from outbreaks of emerging diseases. Makes recommendations for how the U.S.
Christopher F. Chyba
core  

Atraumatic Reciprocal Scapula Fracture - A Case Report and Review of Literature. [PDF]

open access: yesJ Orthop Case Rep, 2023
Sood C   +4 more
europepmc   +1 more source

AES Variants Secure against Related-Key Differential and Boomerang Attacks [PDF]

open access: yes, 2011
In this paper, we present a framework for protection against the recent related-key differential and boomerang attacks on AES by Biryukov et al. Then we study an alternative AES key schedule proposed by May et al. at ACISP 2002 as a possible candidate to protect against these related key attacks.
Jiali Choy   +4 more
openaire   +1 more source

Rectangle and Boomerang Attacks on DES [PDF]

open access: yesJournal of Software, 2008
Lei ZHANG, Wen-Ling WU
openaire   +1 more source

GOP candidates unite to attack the media in the third presidential debate [PDF]

open access: yes, 2015
Last week, the Republican Party held its third debate in their presidential primary. Jenny Tatsak writes that the debate was characterized by successful attacks from Senator Ted Cruz on the CNBC debate moderators, and an effective defense from Senator ...
Tatsak, Jenny
core  

Home - About - Disclaimer - Privacy