-
-
-
[
Visual C++ (VC++)]
twopipestelnetcmd.rar
Shellcode on the target machine through the establishment of the host, through the attack to open a cmd.exe, the operation can be achieved, such as dir
-
[
Visual Basic (VB)]
plane.rar
... to fight the game, there are sound effects, background music, there are points, automatic games, non-automatic, is to use the mouse to operate the missile hair flying in the air combat aircraft, aircraft also fired missiles to attack ground launchers
-
[
Video]
200080919ddos.rar
Types of hacker attacks, DDos attack and preventive measures and strategies, a very good video tutorials for new operations
-
[
PDF]
CryptanalysisofHwang-ChangsaTime-StampProtocolforD
... can
intercept these transmitted data. Then, he can launch an off-line attack to analyze these
intercepted data. We will describe the attacker’s action in this article. After that, we
propose an improved scheme to prevent this off-line attack.
Category:
Document Upload User:
yingda Size:
387K
-
[
PDF]
OnDesignatedlyVerifiedNon-interactive)Watermarking
... similar watermarking
scheme. In this paper, we propose a cryptanalytic attack on both of these
schemes that allows a dishonest ... are valid.We modify the above schemes to overcome
the attack. Further, we also propose a new robust watermarking scheme
...
Category:
Document Upload User:
rongda_110 Size:
142K
-
[
PDF]
CryptanalysisofaNewChaoticCryptosystemBasedonErgod
This paper analyzes the security of a recent cryptosystem based on the ergodicity property
of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext
attack. Some other design weaknesses are also shown.
Category:
Document Upload User:
hong_fa168 Size:
173K
-
[
PDF]
Cryptanalysisofanimageencryptionscheme.rar
... process involves a permutation operation and an XORlike
transformation of the shuffled pixels, which are controlled by three chaotic systems.
This paper discusses some defects of the schemes and how to break them with
a chosen-plaintext attack.
Category:
Document Upload User:
hxjsj20 Size:
246K
-
[
Java/JSP]
CEnemy.rar
J2me mobile game in the realization of a monster in the process. Included in the document the life of a monster attack, and their own actions and so on.
Category:
J2ME Upload User:
ks7816 Size:
2K
-