نتایج جستجو برای: guess and determine attack
تعداد نتایج: 16846896 فیلتر نتایج به سال:
We consider a network planning method that takes into consideration the uncertainties associated with offered traffics when dimensioning ATM networks for prescribed grades of service. Assuming that each reference traffic stream offered between a pair of nodes in a network can only be specified within a lower and upper bound, together with a best guess value, we demonstrate a method for transfor...
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal propagation. In this paper, we introduce a practical and efficient man-in-the-middle attack agains...
Details of pressure distributions, on a two dimensional airfoil oscillating in pitch through stall, in a 0.8 0.8 m low-speed wind tunnel are presented. Pitching occurred about the airfoils quarter-chord axis. Pitch rate, Reynolds number, and oscillation amplitudes were varied to determine the effects on pressure and lift distributions. It was found that mean angle of attack and pitching amplitu...
In this article, we analyse the security of the authenticated encryption mode JAMBU, a submission to the CAESAR competition that remains currently unbroken. We show that the security claims of this candidate regarding its nonce-misuse resistance can be broken. More precisely, we explain a technique to guess in advance a ciphertext block corresponding to a plaintext that has never been queried b...
A message in a protocol is said to have a type-flaw if it was created with some intended type, but is later received and treated as a different type. A type-flaw guessing attack is an attack where a password is guessed and verified by inducing type-flaws in a protocol. Heather et al. [HLS00] prove that attacks that use typeflaws can be prevented if honest agents tag messages with their intended...
a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...
abstract the primary purpose of this study was to explore the actual practices and cognitions of two groups of iranian eap teachers, i.e. language teachers and content teachers, with respect to teaching reading-comprehension and vocabulary. to this end, tehran university of medical sciences which authorizes both groups of teachers to teach eap courses was selected as the context of the study s...
with the introduction of communicative language teaching, a large number of studies have concerned with students’ oral participation in language classrooms. although the importance of classroom participation is evident, some language learners are unwilling to engage in oral activities. this passivity and unwillingness to participate in language classroom discussions is known as “reticence”. rev...
Contactless card payments are being introduced around the world allowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require verification of the cardholder’s PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and deb...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید