Results 21 to 30 of about 587,598 (211)

Modeling and estimation of multi-source clustering in crime and security data [PDF]

open access: yes, 2013
While the presence of clustering in crime and security event data is well established, the mechanism(s) by which clustering arises is not fully understood.
Mohler, George
core   +1 more source

Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning

open access: yesEntropy, 2019
Routers are of great importance in the network that forward the data among the communication devices. If an attack attempts to intercept the information or make the network paralyzed, it can launch an attack towards the router and realize the suspicious ...
Teng Li   +3 more
doaj   +1 more source

Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256

open access: yesJournal of Mathematical Cryptology, 2017
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a candidate for Advanced Encryption Standard (AES). In this paper, we will propose a new chosen text attack, the multiple differential-zero correlation linear
Hadian Dehkordi Massoud   +1 more
doaj   +1 more source

An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack

open access: yes, 2018
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro   +2 more
core   +1 more source

Robustness of onionlike correlated networks against targeted attacks [PDF]

open access: yesPhysical Review E, 2012
12 pages, 8 ...
Tanizawa, Toshihiro   +2 more
openaire   +3 more sources

Multi-point joint power analysis attack against AES

open access: yesTongxin xuebao, 2016
For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as ...
Zhi-bo DU, UNYuan-hua S, ANGYi W
doaj   +2 more sources

Theoretical and experimental power from large horizontal-axis wind turbines [PDF]

open access: yes, 1982
A method for calculating the output power from large horizontal-axis wind turbines is presented. Modifications to the airfoil characteristics and the momentum portion of classical blade element-momentum theory are given that improve correlation with ...
Janetzke, D. C., Viterna, L. A.
core   +2 more sources

Quantum secret sharing based on modulated high-dimensional time-bin entanglement [PDF]

open access: yes, 2006
We propose a new scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,pi}, a sender with the entanglement source can randomly change the sign of the ...
C. H. Bennett, Hiroki Takesue, Kyo Inoue
core   +2 more sources

Zero correlation-integral attack of MIBS block cipher

open access: yesTongxin xuebao, 2016
MIBS is a lightweight block cipher for extremely constrained environments such as RFID tags and sensor networks. The MIBS algorithm's ability to resist zero correlation-integral analysis was evaluated. An 8-round zero corre-lation linear distinguisher of
Qing-cong LIU   +3 more
doaj   +2 more sources

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy