Results 121 to 130 of about 215,935 (334)

Safety vs. Security: Attacking Avionic Systems with Humans in the Loop [PDF]

open access: yesarXiv, 2019
Many wireless communications systems found in aircraft lack standard security mechanisms, leaving them fundamentally vulnerable to attack. With affordable software-defined radios available, a novel threat has emerged, allowing a wide range of attackers to easily interfere with wireless avionic systems.
arxiv  

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Dual Charge Transfer Mechanisms in Intimately Bonded S‐scheme Heterojunction Photocatalyst with Expeditious Activity toward Environmental Remediation

open access: yesAdvanced Sustainable Systems, EarlyView.
A novel MBOdCN S‐scheme heterojunction photocatalyst is fabricated using pristine Mg‐Bi2O3 and grayish g‐C3N4, where dynamic dual charge migration paths occur to accelerate exciton dissociation. This composite catalyst realizes high degradation efficiency of up to 99.56% of oxytetracycline (OTC) removal under optimized conditions. The material exhibits
Potlako J. Mafa   +11 more
wiley   +1 more source

Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

open access: yesJournal of Applied Mathematics, 2013
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang   +4 more
doaj   +1 more source

On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications [PDF]

open access: yesarXiv, 2020
We study the notoriously difficult no-sensing adversarial multi-player multi-armed bandits (MP-MAB) problem from a new perspective. Instead of focusing on the hardness of multiple players, we introduce a new dimension of hardness, called attackability.
arxiv  

The Frequency‐Domain Lattice Boltzmann Method (FreqD‐LBM): A Versatile Tool to Predict the QCM Response Induced by Structured Samples

open access: yesAdvanced Theory and Simulations, EarlyView.
FreqD‐LBM simulates the oscillatory flow at the surface of a QCM‐D resonator in the presence of structured adsorbates. It derives shifts of frequency and bandwidth (equivalent to dissipation) on different overtones. Applications include rough surfaces, adsorbed rigid particles, adsorbed viscoelastic particles, spheres floating freely above the surface,
Diethelm Johannsmann   +5 more
wiley   +1 more source

Improved integral attack——random linear distinguish and key recovery attack

open access: yesTongxin xuebao, 2023
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj   +2 more sources

Optimizing Fast Near Collision Attack on Grain Using Linear Programming

open access: yesIEEE Access, 2019
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj   +1 more source

Insights into the Dynamics and Binding Mechanisms of the Alkhumra Virus NS2B/NS3 Protease: A Molecular Dynamics Study

open access: yesAdvanced Theory and Simulations, EarlyView.
The ΔRMSF$\Delta {\rm RMSF}$ analysis reveals significant flexibility differences between free NS3 and the NS2B/NS3 complex, with notable deviations in specific regions. Key residues driving NS2B binding are identified, and the protonation state of catalytic serine affects oxyanion hole formation.
Jurica Novak   +2 more
wiley   +1 more source

Exploration of Half‐Cycle Length of Converging Circular Wavy Duct with Diverging‐Outlet: Turbulent Water Dynamics

open access: yesAdvanced Theory and Simulations, EarlyView.
Increasing half‐cycles intensifies turbulence due to enhanced vortex interactions and flow separation at the diverged‐outlets. Longer wavy ducts are shown to increase flow acceleration, resulting in greater output velocities and more turbulent‐kinetic‐energy production. Wave‐period plays a crucial role in determining turbulent intensity, with amplitude
I. L. Animasaun   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy