Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: attack inversion
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Search alternatives
:
attack inversion »
attack intension
,
stack inversion
,
attack version
Showing
1
-
20
of
128
Search:
'attack inversion'
,
query time: 0.30s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Attacks
, Defenses and Testing for Deep Learning
by
Chen, Jinyin
,
Zhang, Ximin
,
Zheng, Haibin
Published 2024
Springer Nature Singapore
Table of Contents:
“
... on Critical Areas -- Neuron-level
Inverse
Perturbation Against Adversarial
Attacks
-- Adaptive Channel...
”
Read Now
2
Secure Voice Processing Systems against Malicious Voice
Attacks
by
Sun, Kun
,
Wang, Shu
Published 2024
Springer Nature Switzerland
Table of Contents:
“
...: Parameters in Detection Methods -- Appendix 2.C:
Inverse
Filter Implementation -- Appendix 2.D: Classifiers...
”
Read Now
3
Smart Urban Water Networks
by
Creaco, Enrico
Published 2021
MDPI - Multidisciplinary Digital Publishing Institute
Subjects:
“
...
inverse
transient analysis (ITA)...
”
Read Now
4
Modelling and Control of Mechatronic and Robotic Systems, Volume II
by
Gasparetto, Alessandro
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects:
“
...terrorist
attacks
...
”
Read Now
5
Visual Sensors
by
Reinoso Garcia, Oscar
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects:
“
...
inverse
compositional Gauss-Newton algorithm...
”
Read Now
6
Machine Learning for Energy Systems
by
Sidorov, Denis N.
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects:
“
...
inverse
problems...
”
Read Now
7
Advances in Information and Computer Security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
Published 2014
Springer International Publishing
Table of Contents:
“
... Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for
Attack
...
”
Read Now
8
Adaptive Compensation of Nonlinear Actuators for Flight Control Applications
by
Deb, Dipankar
,
Burkholder, Jason
,
Tao, Gang
Published 2022
Springer Nature Singapore
Table of Contents:
“
...Introduction -- Active Flow Control -- Adaptive Compensation at Low Angles of
Attack
: Linear...
”
Read Now
9
Selected Areas in Cryptography : 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers
Published 2004
Springer Berlin Heidelberg
Table of Contents:
“
...
Attack
of SNOW 2.0 with Linear Masking Method -- Cryptographic Primitives -- On the Use of GF-
Inversion
...
”
Read Now
10
An Introduction to Cryptology
by
van Tilborg, Henk C.A.
Published 1988
Springer US
Table of Contents:
“
...
attack
-- 11.3. The Lagarias and Odlyzko
attack
-- 12. Threshold Schemes -- 13. Other Directions...
”
Read Now
11
Advances in Cryptology — CRYPTO ’91 : Proceedings
Published 1992
Springer Berlin Heidelberg
Table of Contents:
“
... with Space Bounded Provers -- Functional
Inversion
and Communication Complexity -- The Use of Interaction...
”
Read Now
12
Post-Quantum Cryptography : 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
Published 2022
Springer International Publishing
Table of Contents:
“
... Polynomial
Inversion
at Arbitrary Order -- A Power Side-Channel
Attack
on the Reed-Muller Reed-Solomon...
”
Read Now
13
Basic Numerical Mathematics : Vol 2: Numerical Algebra
by
Todd, J.
Published 1977
Birkhäuser
Table of Contents:
“
... -- 4. The
Inversion
Problem I: Theoretical Arithmetic -- 5. The
Inversion
Problem II: Practical...
”
Read Now
14
Advanced Encryption Standard - AES : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
...Cryptanalytic
Attacks
and Related Results -- The Cryptanalysis of the AES – A Brief Survey...
”
Read Now
15
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part II
Published 2024
Springer Nature Singapore
Table of Contents:
“
... Quantum Multi collision Distinguishers and Rebound
Attacks
with Triangulation Algorithm -- Lattice based...
”
Read Now
16
Informed Watermarking
by
Eggers, Joachim
,
Girod, Bernd
Published 2002
Springer US
Table of Contents:
“
...
attacks
-- A.3 Derivation Details for
Inverse
SCS Mapping -- A.4 SCS Watermarking Facing Scalar...
”
Read Now
17
Cryptographic Hardware and Embedded Systems -- CHES 2010 : 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... -- Efficient Techniques for High-Speed Elliptic Curve Cryptography -- Side-Channel
Attacks
and Countermeasures...
”
Read Now
18
Information Security and Privacy : 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings
Published 1999
Springer Berlin Heidelberg
Table of Contents:
“
...-Permutation Protection Scheme against Modification
Attack
--
Inversion
Attack
and Branching -- Signatures...
”
Read Now
19
Advanced Computational Intelligence Paradigms in Healthcare - 2
Published 2007
Springer Berlin Heidelberg
Table of Contents:
“
... --
Attacking
the
Inverse
Electromagnetic Problem of the Heart with Computationally Compatible Anatomical...
”
Read Now
20
Information Security and Privacy : 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Published 2007
Springer Berlin Heidelberg
Table of Contents:
“
... Modular Multiplication -- Affine Precomputation with Sole
Inversion
in Elliptic Curve Cryptography...
”
1
2
3
4
5
6
7
Back
Narrow Search
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
43
006 - Special computer methods
27
004 - Data processing & computer science
22
620 - Engineering & allied operations
7
621 - Applied physics
7
003 - Systems
6
more ...
600 - Technology
4
629 - Other branches of engineering
4
000 - Computer science, information & general works
3
363 - Other social problems & services
3
515 - Analysis
3
700 - The arts; fine & decorative arts
3
900 - History & geography
3
140 - Specific philosophical schools
2
300 - Social sciences
2
500 - Natural sciences & mathematics
2
519 - Probabilities & applied mathematics
2
571 - Physiology & related subjects
2
720 - Architecture
2
001 - Knowledge
1
323 - Civil & political rights
1
331 - Labor economics
1
333 - Economics of land & energy
1
400 - Language
1
511 - General principles of mathematics
1
512 - Algebra
1
518 - Numerical analysis
1
530 - Physics
1
576 - Genetics & evolution
1
580 - Plants (Botany)
1
745 - Decorative arts
1
794 - Indoor games of skill
1
see all ...
less ...
Language
English
128
Collection
Springer eBooks 2005-
91
Springer Book Archives -2004
25
O'Reilly
7
Directory of Open Access Books
4
Springer Protocols Archive 1981-2004
1
Author
Pieprzyk, Josef
3
Cheng, Long
2
Jones, Heddwyn
2
Koc, Cetin K.
2
Kozyrev, Dmitry V.
2
Li, Hongyi
2
more ...
Luo, Biao
2
Paar, Christof
2
Rijmen, Vincent
2
Safavi-Naini, Rei
2
Samouylov, Konstantin E.
2
Saraswat, Mukesh
2
Vishnevskiy, Vladimir M.
2
Wu, Weili
2
Wu, Zheng-Guang
2
Yung, Moti
2
Albada, Geert Dick van
1
Alonstioti, Nancy
1
Ammari, Habib
1
Angelov, Plamen
1
Antoniano Villalobos, Isadora
1
Aravena, Jorge L.
1
Argiento, Raffaele
1
Athanasopoulos, Elias
1
Aved, Alex J.
1
Avidan, Shai
1
Awrejcewicz, Jan
1
Ayu, Media Anugerah
1
Azemard, Nadine
1
Bandini, Stefania
1
Bansal, Jagdish Chand
1
Begehr, Heinrich
1
Berry, Karl
1
Beyer, Dirk
1
Bisgin, Halil
1
Blasch, Erik P.
1
Boccelli, Dominic L.
1
Boldyreva, Alexandra
1
Boumerdassi, Selma
1
Boyd, Colin
1
Boztas, Serdar
1
Bray, Shannon
1
Brostow, Gabriel
1
Buhan, Ileana
1
Burkholder, Jason
1
Buzzard, Kevin
1
Byrnes, J.S.
1
Canteaut, Anne
1
Chaki, Nabendu
1
Chaki, Rituparna
1
Chan, Agnes Hui
1
Chatterjee, Sharmistha
1
Chee, Seongtaek
1
Chellappan, Sriram
1
Chen, Jinyin
1
Chen, Xiaofeng
1
Cheng, Wei
1
Cheon, Jung Hee
1
Chittayasothorn, Suphamit
1
Chowdhury, Ananda
1
Cissé, Moustapha
1
Cortesi, Agostino
1
Cramer, Ronald
1
Creaco, Enrico
1
Dancy, Christopher
1
Daras, Nicholas J.
1
Darema, Frederica
1
Davitashvili, Teimuraz
1
Dawson, Ed
1
Deb, Dipankar
1
Deep, Kusum
1
Deng, Robert H.
1
Dhall, Abhinav
1
Di Nardo, Armando
1
Dickenstein, Alicia
1
Dobbertin, Hans
1
Dolev, Shlomi
1
Dongarra, Jack
1
Dongarra, Jack J.
1
Duan, Nan
1
Dutta, Sushanta
1
Ebel, Adolf
1
Eggers, Joachim
1
Eick, Bettina
1
Elleithy, Khaled
1
Farinella, Giovanni Maria
1
Faugeras, Olivier
1
Feigenbaum, Joan
1
Feng, Dengguo
1
Feng, Lili
1
Ferrer, Josep L.
1
Filimonov, Nikolay
1
Fischer-Hübner, Simone
1
Freiling, Felix C.
1
Gaborit, Philippe
1
Gandomi, Amir H.
1
Gasparetto, Alessandro
1
Gelenbe, Erol
1
Ghodosi, Hossein
1
Giri, Debasis
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?lookfor=attack+inversion&type=AllFields
Send by Email
×
Loading...