Welcome![Sign In][Sign Up]
Location:
Search - attack

Search list

[Othercube

Description: cube attack,针对对称密码体制和公钥密码体制、流密码的立方攻击-cube attack, for symmetric cryptography and public key cryptography, stream ciphers cubic attack
Platform: | Size: 236544 | Author: 王文浩 | Hits:

[matlabchi-square

Description: chi square attack for steganogrpahy
Platform: | Size: 1024 | Author: hr | Hits:

[Software EngineeringMFCUK_darkside_0.3

Description: Darkside attack rfid mifare classic
Platform: | Size: 849920 | Author: wachutunai | Hits:

[Graph programDCT_SVD

Description: 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm for adaptive watermark embedding. Firstly, a video stream is divided into scenes, scenes of the video image is converted to the DCT-SVD domain, the watermark embedded in the largest singular quantification, the realization of the watermark signal. Furthermore, the experiments show that the algorithm meet the transparency requirements are met under certain robustness requirements, can resist the low-pass filtering, median filtering, salt and pepper noise, Gaussian noise, H.264 compression attacks and attacks and frame shear statistics attack.
Platform: | Size: 63488 | Author: 久久 | Hits:

[Communicationejsr_31_2_01

Description: paper on Attack on LSB Steganography in Color and Grayscale Images Using Autocorrelation Coefficients
Platform: | Size: 285696 | Author: mohmmed omar | Hits:

[Windows Develop2007511125010716_136Z_Com

Description: 本代码演示了缓冲区溢出的攻击与防范,运行环境:9x/Me/NT/2000/XP/-This code demonstrates the buffer overflow attack and prevention, operating environment: 9x/Me/NT/2000/XP /
Platform: | Size: 47104 | Author: xiaofeng | Hits:

[Other Gamesattack-plane

Description: attack plan simple game bulit under MFC VC6.0
Platform: | Size: 428032 | Author: k_wx | Hits:

[Special Effectscrtav

Description: 本源代码对嵌有水印的图像进行各种类型的攻击,验证其鲁棒性能。-Source code on the watermarked image various types of attack, verify its robustness.
Platform: | Size: 1024 | Author: pinbo | Hits:

[Windows DevelopSOCKET-attack

Description: socket 攻击程序 c++源代码 dos攻击-c++ socket exploit source code dos attack
Platform: | Size: 6144 | Author: 九哥 | Hits:

[Software Engineeringcharset-attack-in-webapp

Description: Web应用程序中的字符集攻击 目录 为什么要讨论字符集攻击 字节流和数据的本质 web架构层次 web数据处理流程 字符集处理过程中可能出现的安全问题 web各个层中的字符集攻击 其他可能出现的攻击 在应用程序中避免出现字符集问题 -Web application character set attack Directory Why attack the character set to be discussed Byte stream and the nature of the data web architecture level web data processing The process of character set handling security issues that may arise each layer of web attacks on the character set Other possible attacks In the application to avoid character set problem
Platform: | Size: 19456 | Author: 林珺 | Hits:

[Linux-Unixattack-0.5

Description: File for Misuse AODV 3
Platform: | Size: 2048 | Author: rutusoft | Hits:

[Linux-Unixattack-1.0

Description: File for Misuse AODV 4
Platform: | Size: 2048 | Author: rutusoft | Hits:

[Internet-Networkattack-1.5

Description: File for Misuse AODV 5
Platform: | Size: 2048 | Author: rutusoft | Hits:

[Crack HackDES

Description: This particular algorithm is a brute force attack on the popular DES Encryption standard. The DES algorithm consists of 4 main classes which will be briefly discussed -The first class takes into consideration the assumption that the in the inputs are in hex format. Therefore a method was created to convert the hex into binary so that it could be easily permuted. -The second class takes the converted binary input and passes it through a variety of member permutation functions. -The next class also known as the key class handles operations on keys that have not been permuted. -The S-box functionality is provided by the last class.
Platform: | Size: 9216 | Author: RobT | Hits:

[xml-soap-webservicememoire_sw_sql_injection

Description: PROTECTION AGAINST INPUT MANIPULATION VULNERABILITIES IN SERVICE ORIENTED ARCHITECTURE Thesis Submitted in partial fulfillment of the requirements for the degree of MASTER OF TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING – INFORMATION SECURITY by DEEPAK D J Keywords: Service Oriented Architecture, XML firewall, Web service Attack, Input manipulation, Denial of service (DOS), XDOS, SQL Injection , SOAP, Web Service Security.
Platform: | Size: 920576 | Author: BARBIESS | Hits:

[CSharpMM_AlfRealtime

Description: program simulates the flight of aircraft in the longitudinal plane and displays the graph of the angle of attack
Platform: | Size: 260096 | Author: Sasha | Hits:

[ERP-EIP-OA-PortalLAN-ARP-attack

Description: ARP 以后,对整个网络会有点影响,监听也只能监听一部分,不象同一HUB下的监听。对被监听者会有影响,因为他掉了一部分数据。 当然还有其他一些应用,需要其他技术的配合。以下是send_arp.c的源程序 -ARP after a bit of the whole network, monitor only a part of listening, not listening, as under the same HUB. Have an impact on those who are listening, because he lost part of the data. Of course there are other applications that require the cooperation of other technologies. The following is the source send_arp.c
Platform: | Size: 1024 | Author: zhangxi | Hits:

[Industry researchFor-WSN-localization-algorithm

Description: 用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
Platform: | Size: 145408 | Author: 于洋 | Hits:

[OtherHackers-Attack-Cheats-loud-report

Description: 此书籍隶属黑客攻防秘技大声报,书名黑客攻防秘技大声报-Hackers Attack Cheats loud report
Platform: | Size: 30893056 | Author: 杨波 | Hits:

[Mathimatics-Numerical algorithmsResearch-on-Side-Channl-Attack

Description: 旁道攻击是一种针对密码设备的新型攻击技术。本文介绍旁道攻击技术,描述了旁道攻击技术的发展概况,给出和分析了一种可防旁道攻击的模指算法。-Side channel attack is an attack against the password for the new equipment technology. This article describes the technical side channel attack, describes the technology development side channel attack profiles, can be given and analyzed a model against side channel attacks that algorithm.
Platform: | Size: 178176 | Author: | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »

CodeBus www.codebus.net