搜索资源列表
NOW_TechReport_Attacks_on_Inter_Vehicle_Communicat
- 目前最新车辆通讯模式以及房车辆碰撞技术文件论文-Inter-vehicle communication systems are a new paradigm of networking. Largely related to mobile ad hoc networks and their distributed, self-organizing structure, they also introduce new threats. In order to assess these
AnalysisofmaximizeddifferentialpoweragainstAES(1).
- 在讨论AES 功耗模型的基础上,提出了一种新的最大差分功耗攻击(MDPA) 的方法. 算法对被攻击的 部分明文用猜测的密钥进行变换,采用差分的方法去除噪声,比较由变换后的明文和正确密钥产生的一组功 耗值,通过寻找最大功耗值得到正确的密钥.-Power model in the discussion on the basis of AES, a new maximum differential power attacks (MDPA) method. Algorithm was attac
11
- 本文采用了一种层次化、组件自治的仿真平台_J.Sim,对该平台 下的无线传感器网络相关组件进行了扩展。针对MAC协议的能量有效性 和底层可能遭受的攻击行为,进行了一系列的仿真实验,输出了相关的 能耗图。通过与其它MAC能耗仿真结果对比和底层攻击仿真结果分析, 我们得出该协议有着较好的能量有效性和攻击应对能力。-As the hardware platform iS lacked.we choose the J.Sim simulator which is built upon
System-Attacks
- This very simple article on System attacks. By reading this article, we can understand how day to day attacks are possible on Computer. I think this is good reading for new people in Computer Security domain.-This is very simple article on System att
attacks2
- Attacks on More Virtual Machine Emulators. PDF Paper shows how detect vm s. uploaded by d3m
SIMULATION-AND-SYNTHESIS-OF-TRIPLE-DES-BLOCK-CIPH
- This project presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously introduced technique to protect smart card implementations from these
neta_v1-1.0.tar
- Network Attack Model for omnetpp
