Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
Othercube
DL : 0
cube attack,针对对称密码体制和公钥密码体制、流密码的立方攻击-cube attack, for symmetric cryptography and public key cryptography, stream ciphers cubic attack
Update : 2024-05-05 Size : 236544 Publisher : 王文浩

DL : 0
chi square attack for steganogrpahy
Update : 2024-05-05 Size : 1024 Publisher : hr

Darkside attack rfid mifare classic
Update : 2024-05-05 Size : 849920 Publisher : wachutunai

DL : 1
本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine Transform) and SVD (singular value decomposition) algorithm for adaptive watermark embedding. Firstly, a video stream is divided into scenes, scenes of the video image is converted to the DCT-SVD domain, the watermark embedded in the largest singular quantification, the realization of the watermark signal. Furthermore, the experiments show that the algorithm meet the transparency requirements are met under certain robustness requirements, can resist the low-pass filtering, median filtering, salt and pepper noise, Gaussian noise, H.264 compression attacks and attacks and frame shear statistics attack.
Update : 2024-05-05 Size : 63488 Publisher : 久久

paper on Attack on LSB Steganography in Color and Grayscale Images Using Autocorrelation Coefficients
Update : 2024-05-05 Size : 285696 Publisher : mohmmed omar

本代码演示了缓冲区溢出的攻击与防范,运行环境:9x/Me/NT/2000/XP/-This code demonstrates the buffer overflow attack and prevention, operating environment: 9x/Me/NT/2000/XP /
Update : 2024-05-05 Size : 47104 Publisher : xiaofeng

attack plan simple game bulit under MFC VC6.0
Update : 2024-05-05 Size : 428032 Publisher : k_wx

DL : 0
本源代码对嵌有水印的图像进行各种类型的攻击,验证其鲁棒性能。-Source code on the watermarked image various types of attack, verify its robustness.
Update : 2024-05-05 Size : 1024 Publisher : pinbo

socket 攻击程序 c++源代码 dos攻击-c++ socket exploit source code dos attack
Update : 2024-05-05 Size : 6144 Publisher : 九哥

Web应用程序中的字符集攻击 目录 为什么要讨论字符集攻击 字节流和数据的本质 web架构层次 web数据处理流程 字符集处理过程中可能出现的安全问题 web各个层中的字符集攻击 其他可能出现的攻击 在应用程序中避免出现字符集问题 -Web application character set attack Directory Why attack the character set to be discussed Byte stream and the nature of the data web architecture level web data processing The process of character set handling security issues that may arise each layer of web attacks on the character set Other possible attacks In the application to avoid character set problem
Update : 2024-05-05 Size : 19456 Publisher : 林珺

DL : 0
File for Misuse AODV 3
Update : 2024-05-05 Size : 2048 Publisher : rutusoft

DL : 0
File for Misuse AODV 4
Update : 2024-05-05 Size : 2048 Publisher : rutusoft

File for Misuse AODV 5
Update : 2024-05-05 Size : 2048 Publisher : rutusoft

DL : 0
This particular algorithm is a brute force attack on the popular DES Encryption standard. The DES algorithm consists of 4 main classes which will be briefly discussed -The first class takes into consideration the assumption that the in the inputs are in hex format. Therefore a method was created to convert the hex into binary so that it could be easily permuted. -The second class takes the converted binary input and passes it through a variety of member permutation functions. -The next class also known as the key class handles operations on keys that have not been permuted. -The S-box functionality is provided by the last class.
Update : 2024-05-05 Size : 9216 Publisher : RobT

PROTECTION AGAINST INPUT MANIPULATION VULNERABILITIES IN SERVICE ORIENTED ARCHITECTURE Thesis Submitted in partial fulfillment of the requirements for the degree of MASTER OF TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING – INFORMATION SECURITY by DEEPAK D J Keywords: Service Oriented Architecture, XML firewall, Web service Attack, Input manipulation, Denial of service (DOS), XDOS, SQL Injection , SOAP, Web Service Security.
Update : 2024-05-05 Size : 920576 Publisher : BARBIESS

DL : 0
program simulates the flight of aircraft in the longitudinal plane and displays the graph of the angle of attack
Update : 2024-05-05 Size : 260096 Publisher : Sasha

ARP 以后,对整个网络会有点影响,监听也只能监听一部分,不象同一HUB下的监听。对被监听者会有影响,因为他掉了一部分数据。 当然还有其他一些应用,需要其他技术的配合。以下是send_arp.c的源程序 -ARP after a bit of the whole network, monitor only a part of listening, not listening, as under the same HUB. Have an impact on those who are listening, because he lost part of the data. Of course there are other applications that require the cooperation of other technologies. The following is the source send_arp.c
Update : 2024-05-05 Size : 1024 Publisher : zhangxi

用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
Update : 2024-05-05 Size : 145408 Publisher : 于洋

此书籍隶属黑客攻防秘技大声报,书名黑客攻防秘技大声报-Hackers Attack Cheats loud report
Update : 2024-05-05 Size : 30893056 Publisher : 杨波

旁道攻击是一种针对密码设备的新型攻击技术。本文介绍旁道攻击技术,描述了旁道攻击技术的发展概况,给出和分析了一种可防旁道攻击的模指算法。-Side channel attack is an attack against the password for the new equipment technology. This article describes the technical side channel attack, describes the technology development side channel attack profiles, can be given and analyzed a model against side channel attacks that algorithm.
Update : 2024-05-05 Size : 178176 Publisher :
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.