Results 31 to 40 of about 131,000 (194)
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion [PDF]
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization.
Atia, George, Guirguis, Mina
core +2 more sources
Surface damage evolution of artillery barrel under high-temperature erosion and high-speed impact
Thermochemical erosion and mechanical wear are the primary sources of surface damage in artillery barrel chambers, severely restricting the interior ballistic characteristics and service life of the barrel weapon.
Shuli Li, Liqun Wang, Guolai Yang
doaj +1 more source
Detection of attack behaviour of pig based on deep learning
Attack behaviour detection of the pig is a valid method to protect the health of pig. Due to the farm conditions and the illumination changes of the piggery, the images of the pig in the videos are often being overlapped, which lead to difficulties in ...
Yanwen Li+3 more
doaj +1 more source
Quantum Tokens for Digital Signatures [PDF]
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three quantum signing tokens and his classical public key. The
Ben-David, Shalev, Sattath, Or
core +2 more sources
Enhancing Collision Attacks [PDF]
Side Channel Attacks (SCA) have received a huge interest in the last 5 years. These new methods consider non-cryptographic sources of information (like timing or power consumption) in addition to traditional techniques. Consequently block ciphers must now resist a variety of SCAs, among which figures the class of “collision attacks”.
Frédéric Muller+2 more
openaire +2 more sources
Preimage and Collision Attacks on MD2 [PDF]
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The time complexity of the attack is about 2104 and the preimages consist always of 128 blocks.
John Erik Mathiassen, Lars R. Knudsen
openaire +1 more source
A Collision-Attack on AES [PDF]
Recently a new class of collision attacks which was originally suggested by Hans Dobbertin has been introduced. These attacks use side channel analysis to detect internal collisions and are generally not restricted to a particular cryptographic algorithm. As an example, a collision attack against DES was proposed which combines internal collisions with
Gregor Leander+3 more
openaire +2 more sources
Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall+2 more
core +2 more sources
Hypothesis Testing Based Side-Channel Collision Analysis
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj +1 more source