Results 321 to 330 of about 1,585,996 (337)
Some of the next articles are maybe not open access.
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
Proceedings of the IEEE, 2017Aditya Ashok, Jianhui Wang
exaly
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
Fast Software Encryption Workshop, 2012Ji Li, Takanori Isobe, Kyoji Shibutani
semanticscholar +1 more source
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack
Science China Information Sciences, 2017An Wang+5 more
semanticscholar +1 more source
Correlation-Enhanced Power Analysis Collision Attack
Workshop on Cryptographic Hardware and Embedded Systems, 2010A. Moradi, Oliver Mischke, T. Eisenbarth
semanticscholar +1 more source
RAD‐EI: A routing attack detection scheme for edge‐based Internet of Things environment
International Journal of Communication Systems, 2019Ashok Kumar Das+2 more
exaly
A Meet-in-the-Middle Collision Attack Against the New FORK-256
IACR Cryptology ePrint Archive, 2007Markku-Juhani O. Saarinen
semanticscholar +1 more source
Nonstructural carbohydrate dynamics of lodgepole pine dying from mountain pine beetle attack
New Phytologist, 2016Erin Wiley, Simon M Landhäusser
exaly