Results 31 to 40 of about 5,572,769 (345)
Anonymizing continuous queries with delay-tolerant mix-zones over road networks [PDF]
This paper presents a delay-tolerant mix-zone framework for protecting the location privacy of mobile users against continuous query correlation attacks.
Balaji Palanisamy +10 more
core +3 more sources
Correlation between CGRP and Migraine Attacks [PDF]
Any hypothesis regarding pain in primary headache disorders rests on the classic observations which describe painful sensations as a result of mechanical or electrical stimulation of large cerebral arteries, venous sinuses, and dural arteries, by Ray and Wolff (1).
openaire +3 more sources
Modeling and estimation of multi-source clustering in crime and security data [PDF]
While the presence of clustering in crime and security event data is well established, the mechanism(s) by which clustering arises is not fully understood.
Mohler, George
core +1 more source
At CRYPTO 2018, Todo et al. proposed an effective fast correlation attack using multiple linear approximations, and gave effective attacks on the Grain-like stream ciphers with the same size of LFSR and key.
Sudong Ma +4 more
semanticscholar +1 more source
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning
Routers are of great importance in the network that forward the data among the communication devices. If an attack attempts to intercept the information or make the network paralyzed, it can launch an attack towards the router and realize the suspicious ...
Teng Li +3 more
doaj +1 more source
Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a candidate for Advanced Encryption Standard (AES). In this paper, we will propose a new chosen text attack, the multiple differential-zero correlation linear
Hadian Dehkordi Massoud +1 more
doaj +1 more source
Theoretical and experimental power from large horizontal-axis wind turbines [PDF]
A method for calculating the output power from large horizontal-axis wind turbines is presented. Modifications to the airfoil characteristics and the momentum portion of classical blade element-momentum theory are given that improve correlation with ...
Janetzke, D. C., Viterna, L. A.
core +2 more sources
Multi-point joint power analysis attack against AES
For the power analysis attack of the AES cryptographic algorithm with the single information leakage point,the traditional attack method does not use as much information as possible in the algorithm and power trace.So there are some problems such as ...
Zhi-bo DU, UNYuan-hua S, ANGYi W
doaj +2 more sources
An Improved Statistic for the Pooled Triangle Test against PRNU-Copy Attack
We propose a new statistic to improve the pooled version of the triangle test used to combat the fingerprint-copy counter-forensic attack against PRNU-based camera identification [1].
Barni, Mauro +2 more
core +1 more source
Quantum secret sharing based on modulated high-dimensional time-bin entanglement [PDF]
We propose a new scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,pi}, a sender with the entanglement source can randomly change the sign of the ...
C. H. Bennett, Hiroki Takesue, Kyo Inoue
core +2 more sources

