نتایج جستجو برای: guess and determine attack

تعداد نتایج: 16846896  

Journal: :Michigan Law Review 1993

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2017
David Deamer

Pearce et al. (1) have made a bold and challenging attempt to provide a quantitative estimate for the accumulation of nucleobases, like adenine, on the Hadean Earth some 4 billion y ago, before life began. Why bold? There must have been a source of organic compounds for life to begin, and they chose an extraterrestrial source—carbonaceous meteorites—rather than the geochemical source more commo...

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

Journal: :Journal of Combinatorial Theory, Series A 1992

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - پژوهشکده تربیت بدنی و علوم ورزشی 1391

چکیده معضل چاقی به عنوان عارضه ای جدی برای زندگی بی تحرک و ماشینی، مورد توجه اغلب مراکز بهداشتی و درمانی دنیا قرار گرفته است. چاقی عامل زمینه ساز و در واقع عامل خطری برای بروز بیماری های قلبی - عروقی است که عموماً با کاهش طول عمر مورد انتظار و افزایش بیماری همراه است. هدف پژوهش حاضر تأثیر 12 هفته تمرینات ویبریشن کل بدن، تمرینات هوازی و تمرینات ترکیبی( هوازی و ویبریشن کل بدن) بر ترکیب بدنی زنان ...

Fatemeh Baghernejad Masoumeh Safkhani, Nasour Bagheri

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

Journal: :CoRR 2015
M. H. R. Khouzani Piotr Mardziel Carlos Cid Mudhakar Srivatsa

Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it is a password for user authentication or a secret key for a cryptographic primitive, picking it requires the user to trade-off usability costs with resistance against an adversary: a simple password is easier to remember but is also easier to guess; likewise, a shorter cryptographic key may require fewer...

Journal: :Classical quarterly 2023

Abstract This article addresses the view that Cicero's Pro Roscio Amerino contains ‘criticism’ of Sulla (the ‘anti-Sulla’ thesis). It argues there is no evidence criticism, Cicero had incentive to criticize Sulla, and his attack aimed solely against Chrysogonus. In particular, draws attention methodological implications thesis, arguing it unsound second-guess meaning, project ‘sarcasm’ onto wor...

Journal: :Proceedings of the ... Annual Hawaii International Conference on System Sciences 2021

Typing passwords is vulnerable to shoulder-surfing attacks. We proposed a resistant scheme embedded in traditional textual this study. With the scheme, when password field on focus, pattern appears it as hint tell user how enter password. Following hint, needs skip some characters while typing The be skipped are randomly selected so that an observer will not able see whole even if authenticatio...

Well test analysis of multi-layer reservoir comprises several parts. The first part concerns the estimation of parameters values and next considers finding an appropriate method to determine the unknown reservoir parameters. If the initial estimations are less accurate and weak, the final assessment may lead to incorrect results, which are totally different from the reality. Utilizing Automated...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید