نتایج جستجو برای: ssdf attack
تعداد نتایج: 80839 فیلتر نتایج به سال:
Background and purpose : Since Panic attack is associated with some sotamic symptoms such as, tachycardia, heart beat, dyspenea etc. Generally panic attack makes patients refer to hospital. Ôn this basis, in this Study, prevalence rate of panic disorder, rate of anxiety in the patients under pulmonary performance test referring to Ïmam khomeini hospital of sari were studied in 2000. Materi...
most of the patients imagine that chest pain is not sign of heart attack. but, may be pain is not sign of heart attack. pain source may be from pulmonary, stomach, intestinal, psychologic or musculoskeletal problems. from these factors, when two or more factors combine to each other, similar signs are happen. all of these factors harden diagnosis of chest pain reason. only with separation of pe...
Statins are commonly used drugs in the treatment of hyperlipidemia (HL), despite some undesirable side effects. These range from mild symptoms such as myopathy, muscle weakness and myalgia to severe muscle weakness associated with chronic myopathy and acute renal failure (ARF) as a result of rhabdomyolysis. The most serious and deadly side effect of statins is rhabdomyolysis. The case presente...
how to cite this article: akhondian j, ashrafzadeh f, beiraghi toosi m, hashemi n. a rare presentation of neurobrucellosis in a child with recurrent transient ischemic attacks and pseudotumor cerebri (a case report and review of literature). iran j child neurol. 2014 spring; 8(2):65-69. brucellosis is a multi-system infectious disease that presents with various manifestations and complication...
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید