نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

2014
Malin A. E. König Kari Lehtilä Christer Wiklund Johan Ehrlén

Plants have two principal defense mechanisms to decrease fitness losses to herbivory: tolerance, the ability to compensate fitness after damage, and resistance, the ability to avoid damage. Variation in intensity of herbivory among populations should result in variation in plant defense levels if tolerance and resistance are associated with costs. Yet little is known about how levels of toleran...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

Journal: :Fundam. Inform. 2004
Min-Shiang Hwang Jung-Wen Lo Chia-Hsin Liu

In this manuscript, two key agreement protocols which are resistant to a denial-of-service attack are constructed from a key agreement protocol in [9] provably secure against passive and active attacks. The denial-of-service attack considered is the resource-exhaustion attack on a responder. By the resource-exhaustion attack, a malicious initiator executes a key agreement protocol simultaneousl...

2013
Seonho Choi Hyeonsang Eom Edward Jung

1 This work was supported by ARO grant 48575-RT-ISP. Abstract A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resourc...

2015
Hua Guo Yandong Zheng Biao Wang Zhoujun Li

In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in the journal of Sensors (14(14):24358-24380, doi: 10.3390/ s141224358). They asserted that their Scheme 2 achieves mt-revocation capability, mt-wise forward secrecy, any-wise backward secrecy and has mt-wise collusion attack resistance capability. Unfortunately, t...

Journal: :The Journal of Experimental Medicine 1944
Max B. Lurie

1. Hereditary resistance to attack by air-borne tubercle bacilli is distinct from the resistance to the ensuing disease. 2. One inbred rabbit family has little resistance to attack: by the microorganism but has considerable resistance against the ensuing disease. 3. Another inbred family has considerable resistance against attack by the tubercle bacillus but has little resistance against the en...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید