Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
12183
search results - page 18 / 2437
»
Computers under Attacks!
Sort
relevance
views
votes
recent
update
View
thumb
title
23
click to vote
INFOCOM
2008
IEEE
95
views
Communications
»
more
INFOCOM 2008
»
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis
14 years 4 months ago
Download
www.dsi.uniroma1.it
Patrick Tague, David Slater, Jason Rogers, Radha P...
claim paper
Read More »
28
click to vote
AES
2000
Springer
110
views
Cryptology
»
more
AES 2000
»
Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys
14 years 2 months ago
Download
csrc.nist.gov
Stefan Lucks
claim paper
Read More »
22
click to vote
LATIN
1998
Springer
78
views
Information Technology
»
more
LATIN 1998
»
Strength of Two Data Encryption Standard Implementations under Timing Attacks
14 years 2 months ago
Download
www.cparity.com
Alejandro Hevia, Marcos A. Kiwi
claim paper
Read More »
21
click to vote
IEICET
2006
57
views
more
IEICET 2006
»
Resiliency of Network Topologies under Path-Based Attacks
13 years 9 months ago
Download
ccs.korea.ac.kr
Heejo Lee, Jong Kim, Wan Yeon Lee
claim paper
Read More »
11
click to vote
IJBC
2007
51
views
more
IJBC 2007
»
Topological Vulnerability of the European Power Grid under Errors and Attacks
13 years 9 months ago
Download
complex.upf.es
Martí Rosas-Casals, Sergi Valverde, Ricard ...
claim paper
Read More »
« Prev
« First
page 18 / 2437
Last »
Next »