|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11110 occurrences of 2965 keywords
|
|
|
Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
76 | Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan |
A prediction-based detection algorithm against distributed denial-of-service attacks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS) |
72 | Raphael C.-W. Phan, Sung-Ming Yen |
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks |
68 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
62 | Adam L. Young, Moti Yung |
Bandwidth-Optimal Kleptographic Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory |
52 | Dov M. Gabbay |
Semantics for Higher Level Attacks in Extended Argumentation Frames Part 1: Overview. |
Stud Logica |
2009 |
DBLP DOI BibTeX RDF |
extended argumentations frames, semantics for attacks on attacks, joint attacks |
52 | Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin |
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis |
50 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
49 | Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park |
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing |
49 | Frédéric Didier |
Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
fast algebraic attacks, Wiedemann’s algorithm, algebraic attacks, algebraic immunity |
48 | Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno |
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks |
46 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
46 | Srinivas Mukkamala, Andrew H. Sung |
Computational Intelligent Techniques for Detecting Denial of Service Attacks. |
IEA/AIE |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Zhenghong Wang, Ruby B. Lee |
New cache designs for thwarting software cache-based side channel attacks. |
ISCA |
2007 |
DBLP DOI BibTeX RDF |
security, cache, computer architecture, processor, timing attacks, side channel |
45 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks |
45 | Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta |
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Fast Algebraic Attacks, Boolean Functions, Stream Ciphers, Algebraic Attacks, Symmetric Functions, Algebraic Degree |
45 | Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack |
44 | Lanjun Dang, Weidong Kou, Yuxia Xiao |
An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Frederik Armknecht, Matthias Krause 0001, Dirk Stegemann |
Design Principles for Combiners with Memory. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
combiners with memory, Bluetooth E0, Stream cipher, algebraic attacks, correlation attacks |
42 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi |
Multi-channel Attacks. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA |
42 | Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly |
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
application layer attacks, site security monitoring, anomaly detection, information entropy, denial-of-service attacks |
42 | MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Random M-ary Method Based Countermeasure against Side Channel Attacks. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks |
40 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
40 | Gaël Hachez, Jean-Jacques Quisquater |
Montgomery Exponentiation with no Final Subtractions: Improved Results. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
smart cards, Montgomery multiplication, timing attacks, modular exponentiation, power attacks |
40 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
39 | Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel |
Securing Sensor Nodes Against Side Channel Attacks. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. |
ACM Trans. Web |
2008 |
DBLP DOI BibTeX RDF |
client transparency, game theory, Web servers, DoS Attacks |
39 | Chong Hee Kim, Philippe Bulens, Christophe Petit 0001, Jean-Jacques Quisquater |
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel |
39 | Sanjeev Kumar, Einar Petana |
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security |
39 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations |
39 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
Sign Change Fault Attacks on Elliptic Curve Cryptosystems. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve cryptosystem, smartcards, fault attacks |
39 | Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee 0002, Dowon Hong |
Padding Oracle Attacks on Multiple Modes of Operation. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Padding oracle attacks, Multiple modes of operation, Block ciphers |
39 | Itai Dinur, Adi Shamir |
Cube Attacks on Tweakable Black Box Polynomials. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium |
39 | Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly |
Impact of denial of service attacks on ad hoc networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
black hole attacks, ad hoc networks, DoS attacks |
39 | Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt |
Regional-based authentication against dos attacks in wireless networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
denial-of-service (DoS) attacks, wireless LAN, impersonation attacks |
37 | Shafi Goldwasser |
Cryptography without (Hardly Any) Secrets ? |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel |
Denial-of-service resilience in peer-to-peer file sharing systems. |
SIGMETRICS |
2005 |
DBLP DOI BibTeX RDF |
file pollution, network-targeted attacks, peer-to-peer, denial of service |
36 | Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir |
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
waveform matching, RSA, side-channel attacks, modular exponentiation, power-analysis attacks |
36 | Elias Levy |
Interface Illusions. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Web browser attacks, address-bar spoofing, XUL attacks, hijacking, GUI, attacks, event models |
36 | Arnaud Boscher, Helena Handschuh |
Masking Does Not Protect Against Differential Fault Attacks. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jie Yu 0008, Zhoujun Li 0001, Huowang Chen, Xiaoming Chen |
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Dorgham Sisalem, Jiri Kuthan, Sven Ehlert |
Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Johannes Blömer, Alexander May 0001 |
New Partial Key Exposure Attacks on RSA. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Kahil Jallad, Jonathan Katz, Bruce Schneier |
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Thanh-Ha Le, Cécile Canovas, Jessy Clédière |
An overview of side channel analysis attacks. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
side channel attacks, stochastic model, DPA, DEMA, CPA, template attack |
36 | Igor V. Kotenko, Alexander Ulanov |
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
Cooperative distributed defence, Simulation, DDoS, Network attacks |
36 | Pankaj Kohli, Bezawada Bruhadeshwar |
FormatShield: A Binary Rewriting Defense against Format String Attacks. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Format String Attacks, Intrusion Detection, System Security, Binary Rewriting |
36 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
36 | Kameswari Kotapati, Peng Liu 0005, Thomas F. La Porta |
Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Mobile telecommunication networks, Cascading attacks, Infection propagation rules, 3G networks, Vulnerability assessment, Dependency model |
36 | Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan |
CANDID: preventing sql injection attacks using dynamic candidate evaluations. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
dynamic monitoring, retrofitting code, sql injection attacks, symbolic evaluation |
36 | Simon P. Chung, Aloysius K. Mok |
Advanced Allergy Attacks: Does a Corpus Really Help? |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Allergy Attacks, Intrusion Prevention Systems |
36 | Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan |
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
Secure overlay forwarding system, DDoS attacks |
36 | Mustapha Hedabou |
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map |
36 | Peng Ning, Dingbang Xu |
Hypothesizing and reasoning about attacks missed by intrusion detection systems. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
Intrusion alert correlation, missed attacks, intrusion detection |
36 | Alefiya Hussain, John S. Heidemann, Christos Papadopoulos |
A framework for classifying denial of service attacks. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
security, measurement, time series analysis, denial of service attacks |
36 | Nicolas T. Courtois |
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations |
35 | Billy Bob Brumley, Risto M. Hakala |
Cache-Timing Template Attacks. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cache-timing attacks, elliptic curve cryptography, side channel attacks |
35 | Mario Lamberger, Florian Mendel |
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3 |
35 | Andrey Bogdanov |
Multiple-Differential Side-Channel Collision Attacks on AES. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
multiple-differential collision attacks, AES, collision detection, side-channel attacks, DPA |
35 | Andrey Bogdanov |
Improved Side-Channel Collision Attacks on AES. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks |
35 | Onur Aciiçmez, Çetin Kaya Koç |
Trace-Driven Cache Attacks on AES (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
trace-driven attacks, AES, Side-channel Analysis, cache attacks |
35 | An Yu, David S. Brée |
A Clock-less Implementation of the AES Resists to Power and Timing Attacks. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
clock-less circuits, AES, timing attacks, cryptosystems, power attacks |
35 | Nicolas T. Courtois, Willi Meier |
Algebraic Attacks on Stream Ciphers with Linear Feedback. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations |
35 | Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren |
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque |
E-NIPS: An Event-Based Network Intrusion Prediction System. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection and prediction, attack classes, network security |
34 | Jacques Patarin |
Security of Random Feistel Schemes with 5 or More Rounds. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han |
On the Security of the Full-Band Image Watermark for Copyright Protection. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
Full-band image watermark, constructive attacks, destructive attacks, image embedding, copyright protection, image extraction |
33 | Stefan Tillich, Christoph Herbst |
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking |
33 | Shay Gueron, Jean-Pierre Seifert |
Is It Wise to Publish Your Public RSA Keys? |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks |
33 | Julien Cathalo, François Koeune, Jean-Jacques Quisquater |
A New Type of Timing Attack: Application to GPS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes |
32 | François-Xavier Standaert, François Koeune, Werner Schindler |
How to Compare Profiled Side-Channel Attacks?. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Joana Treger, Jacques Patarin |
Generic Attacks on Feistel Networks with Internal Permutations. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong |
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set |
32 | Yi Xie 0002, Shun-Zheng Yu |
A Novel Model for Detecting Application Layer DDoS Attacks. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Xiapu Luo, Rocky K. C. Chang, Edmond W. W. Chan |
Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. |
MASCOTS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang, Timothy Wood 0001 |
The feasibility of launching and detecting jamming attacks in wireless networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
jammer detection, denial of service, jamming |
32 | Raphael Chung-Wei Phan |
Related-Key Attacks on Triple-DES and DESX Variants. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Kevin P. Anchor, Jesse B. Zydallis, Gregg H. Gunsch, Gary B. Lamont |
Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks. |
EMO |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Ke Li, Wanlei Zhou 0001, Shui Yu 0001, Bo Dai 0006 |
Effective DDoS Attacks Detection Using Generalized Entropy Metric. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
generalized entropy, DDoS, attacks detection |
32 | Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier |
Fault Attacks on RSA Signatures with Partially Unknown Messages. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Coppersmith’s theorem, iso/iec 9796-2, digital signatures, rsa, Fault attacks |
32 | Josep Lluis Berral, Nicolás Poggi, Javier Alonso 0001, Ricard Gavaldà, Jordi Torres, Manish Parashar |
Adaptive distributed mechanism against flooding network attacks based on machine learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
DDOS, machine learning, intrusion detection, cooperative, autonomic computing, flooding attacks |
32 | Meiko Jensen, Nils Gruschka, Norbert Luttenberger |
The Impact of Flooding Attacks on Network-based Services. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Web Services, availability, DoS, attacks, flooding |
32 | Michael Gorski, Stefan Lucks, Thomas Peyrin |
Slide Attacks on a Class of Hash Functions. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks |
32 | Yajuan Tang, Xiapu Luo, Rocky K. C. Chang |
Protecting Internet Services from Low-Rate DoS Attacks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
low-rate DoS attacks, detection, Feedback control, countermeasures |
32 | Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson |
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
filter function, stream ciphers, initialization, algebraic attacks, clock-control |
32 | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
Automated Discovery of Mimicry Attacks. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
IDS evaluation, model-based anomaly detection, model checking, attacks |
32 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
32 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Client-Transparent Approach to Defend Against Denial of Service Attacks. |
SRDS |
2006 |
DBLP DOI BibTeX RDF |
Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers |
32 | Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere |
Hybrid static-dynamic attacks against software protection mechanisms. |
Digital Rights Management Workshop |
2005 |
DBLP DOI BibTeX RDF |
watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance |
32 | Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau |
Countermeasures for Preventing Comb Method Against SCA Attacks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication |
32 | André Adelsbach, Stefan Katzenbeisser 0001, Helmut Veith |
Watermarking schemes provably secure against copy and ambiguity attacks. |
Digital Rights Management Workshop |
2003 |
DBLP DOI BibTeX RDF |
protocol attacks, watermarking, multimedia security |
32 | Philippe Chose, Antoine Joux, Michel Mitton |
Fast Correlation Attacks: An Algorithmic Point of View. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
match-and-sort, algorithmics, cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, parity-checks |
32 | Raphael Chung-Wei Phan, Soichi Furuya |
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule |
32 | Nathalie Weiler |
Honeypots for Distributed Denial of Service Attacks. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Security Practices, Honeypot, Distributed Denial of Service Attacks |
32 | Sreekanth Malladi, Jim Alves-Foss |
What are Multi-Protocol Guessing Attacks and How to Prevent Them. |
WETICE |
2002 |
DBLP DOI BibTeX RDF |
Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE |
32 | Roman Chertov, Sonia Fahmy, Ness B. Shroff |
Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks |
32 | S. Venkatesan 0002, Chenniappan Chellappan |
Protecting free-roaming mobile agent against multiple colluded truncation attacks. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
colluded attacks, encapsulated offer, free-roaming mobile agent, truncation attacks |
32 | Michael Hutter, Stefan Mangard, Martin Feldhofer |
Power and EM Attacks on Passive 13.56 MHz RFID Devices. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
EM Attacks, RFID, AES, Side-Channel Attacks, DPA, Power Analysis, DEMA |
32 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
32 | Itsik Mantin |
Predicting and Distinguishing Attacks on RC4 Keystream Generator. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Predicting attacks, Cryptanalysis, Stream ciphers, RC4, Distinguishing attacks |
32 | Lars R. Knudsen, Xuejia Lai, Bart Preneel |
Attacks on Fast Double Block Length Hash Functions. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions |
Displaying result #1 - #100 of 35802 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|