Results 31 to 40 of about 5,572,769 (345)

Anonymizing continuous queries with delay-tolerant mix-zones over road networks [PDF]

open access: yes, 2013
This paper presents a delay-tolerant mix-zone framework for protecting the location privacy of mobile users against continuous query correlation attacks.
Balaji Palanisamy   +10 more
core   +3 more sources

Correlation between CGRP and Migraine Attacks [PDF]

open access: yesCephalalgia, 2005
Any hypothesis regarding pain in primary headache disorders rests on the classic observations which describe painful sensations as a result of mechanical or electrical stimulation of large cerebral arteries, venous sinuses, and dural arteries, by Ray and Wolff (1).
openaire   +3 more sources

Modeling and estimation of multi-source clustering in crime and security data [PDF]

open access: yes, 2013
While the presence of clustering in crime and security event data is well established, the mechanism(s) by which clustering arises is not fully understood.
Mohler, George
core   +1 more source

Improved Fast Correlation Attack Using Multiple Linear Approximations and Its Application on SOSEMANUK

open access: yesIEEE Transactions on Information Theory
At CRYPTO 2018, Todo et al. proposed an effective fast correlation attack using multiple linear approximations, and gave effective attacks on the Grain-like stream ciphers with the same size of LFSR and key.
Sudong Ma   +4 more
semanticscholar   +1 more source

Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning

open access: yesEntropy, 2019
Routers are of great importance in the network that forward the data among the communication devices. If an attack attempts to intercept the information or make the network paralyzed, it can launch an attack towards the router and realize the suspicious ...
Teng Li   +3 more
doaj   +1 more source

Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256

open access: yesJournal of Mathematical Cryptology, 2017
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a candidate for Advanced Encryption Standard (AES). In this paper, we will propose a new chosen text attack, the multiple differential-zero correlation linear
Hadian Dehkordi Massoud   +1 more
doaj   +1 more source

Theoretical and experimental power from large horizontal-axis wind turbines [PDF]

open access: yes, 1982
A method for calculating the output power from large horizontal-axis wind turbines is presented. Modifications to the airfoil characteristics and the momentum portion of classical blade element-momentum theory are given that improve correlation with ...
Janetzke, D. C., Viterna, L. A.
core   +2 more sources

Multi-point joint power analysis attack against AES

open access: yesTongxin xuebao, 2016
For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as ...
Zhi-bo DU, UNYuan-hua S, ANGYi W
doaj   +2 more sources

An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack

open access: yes, 2018
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro   +2 more
core   +1 more source

Quantum secret sharing based on modulated high-dimensional time-bin entanglement [PDF]

open access: yes, 2006
We propose a new scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,pi}, a sender with the entanglement source can randomly change the sign of the ...
C. H. Bennett, Hiroki Takesue, Kyo Inoue
core   +2 more sources

Home - About - Disclaimer - Privacy