Results 21 to 30 of about 587,598 (211)
Modeling and estimation of multi-source clustering in crime and security data [PDF]
While the presence of clustering in crime and security event data is well established, the mechanism(s) by which clustering arises is not fully understood.
Mohler, George
core +1 more source
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning
Routers are of great importance in the network that forward the data among the communication devices. If an attack attempts to intercept the information or make the network paralyzed, it can launch an attack towards the router and realize the suspicious ...
Teng Li +3 more
doaj +1 more source
Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a candidate for Advanced Encryption Standard (AES). In this paper, we will propose a new chosen text attack, the multiple differential-zero correlation linear
Hadian Dehkordi Massoud +1 more
doaj +1 more source
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro +2 more
core +1 more source
Robustness of onionlike correlated networks against targeted attacks [PDF]
12 pages, 8 ...
Tanizawa, Toshihiro +2 more
openaire +3 more sources
Multi-point joint power analysis attack against AES
For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as ...
Zhi-bo DU, UNYuan-hua S, ANGYi W
doaj +2 more sources
Theoretical and experimental power from large horizontal-axis wind turbines [PDF]
A method for calculating the output power from large horizontal-axis wind turbines is presented. Modifications to the airfoil characteristics and the momentum portion of classical blade element-momentum theory are given that improve correlation with ...
Janetzke, D. C., Viterna, L. A.
core +2 more sources
Quantum secret sharing based on modulated high-dimensional time-bin entanglement [PDF]
We propose a new scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,pi}, a sender with the entanglement source can randomly change the sign of the ...
C. H. Bennett, Hiroki Takesue, Kyo Inoue
core +2 more sources
Zero correlation-integral attack of MIBS block cipher
MIBS is a lightweight block cipher for extremely constrained environments such as RFID tags and sensor networks. The MIBS algorithm's ability to resist zero correlation-integral analysis was evaluated. An 8-round zero corre-lation linear distinguisher of
Qing-cong LIU +3 more
doaj +2 more sources
Cryptanalysis of Reduced round SKINNY Block Cipher
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi +2 more
doaj +1 more source

