Search Result "noise attack"


Patents in Power Analysis Attacks and their Countermeasures for Cryptographic Devices

Journal: Recent Patents on Electrical Engineering
Volume: 3 Issue: 3 Year: 2010 Page: 177-185
Author(s): Radu Muresan

Power Analysis Attacks and Hardware Level Countermeasures for Cryptographic Devices

Journal: Recent Patents on Electrical & Electronic Engineering
Volume: 5 Issue: 3 Year: 2012 Page: 173-184
Author(s): Radu Muresan

New Age Attacks on Smart Homes and CyberPhysical Systems

Ebook: Smart Home and Industrial IoT Devices: Critical Perspectives on Cyberthreats, Frameworks and Protocols
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815256710124010003

Research Article

Black Hole Attack Detection in Healthcare Wireless Sensor Networks Using Independent Component Analysis Machine Learning Technique

Journal: Current Signal Transduction Therapy
Volume: 15 Issue: 1 Year: 2020 Page: 56-64
Author(s): A. John Clement Sunder,A. Shanmugam

Review Article

Key Independent Image Deciphering using Neighbourhood Similarity Characteristics and Divide-and-conquer Attack

Journal: Recent Patents on Engineering
Volume: 15 Issue: 4 Year: 2021 Page: 6-16
Author(s): Ram Ratan,Arvind Yadav

Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks

Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 2 Issue: 2 Year: 2013 Page: 91-101
Author(s): Sandra Sendra,Ferran Llario,Lorena Parra,Jaime Lloret

Research Article

A DCT Fractional Bit Replacement Based Dual Watermarking Algorithmfor Image Authentication

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2899-2919
Author(s): Rahul Dixit,Amita Nandal,Arvind Dhaka,Yohan Varghese Kuriakose,Vardan Agarwal

Research Article

An Asymmetric Optical Cryptosystem of Double Image Encryption Based on Optical Vortex Phase Mask Using Gyrator Transform Domain

Journal: Recent Advances in Computer Science and Communications
Volume: 13 Issue: 4 Year: 2020 Page: 672-685
Author(s): Hukum Singh,Mehak Khurana

Research Article

Comprehensive Performance Analysis of Soft Data Fusion Schemes underSSDF Attacks in Cognitive Radio Networks

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 12 Issue: 4 Year: 2022 Page: 312-318
Author(s):

Research Article

LWT-DCT based Image Watermarking Scheme using Normalized SVD

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2976-2991
Author(s): Rahul Dixit,Amita Nandal,Arvind Dhaka,Vardan Agarwal,Yohan Varghese Kuriakose

Previous   Next

Go To   Results 1 - 1 of 434

Apply Filters

Volume Years
Article Type
Publication Title
Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy