نتایج جستجو برای: sabotage

تعداد نتایج: 598  

Journal: :IACR Cryptology ePrint Archive 2017
Renaud Dubois

In this paper we describe how to use a secret bug as a trapdoor to design trapped ellliptic curve E(Fp). This trapdoor can be used to mount an invalid curve attack on E(Fp). E(Fp) is designed to respect all ECC security criteria (prime order, high twist order, etc.) but for a secret exponent the point is projected on another unsecure curve. We show how to use this trap with a particular type of...

Journal: :Procedia - Social and Behavioral Sciences 2013

Journal: :The International Journal of Interdisciplinary Social Sciences: Annual Review 2007

Journal: :Prehospital and disaster medicine 2013
Samuel J Stratton

Research and evaluation of health and medical response during mass-gathering events originated during the early phases of disaster medical science. While there is no standard definition of a mass gathering, a simple way of conceptualizing a mass gathering is as an event with a theme occurs at a location and more people than usual for the location come together. Because mass gatherings occur as ...

2009
Nina Gierasimczuk Lena Kurzen Fernando R. Velázquez-Quesada

In formal approaches to inductive learning, the ability to learn is understood as the ability to single out a correct hypothesis from a range of possibilities. Although most of the existing research focuses on the characteristics of the learner, in many paradigms the significance of the teacher’s abilities and strategies is in fact undeniable. Motivated by this observation, in this paper we hig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید