|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8634 occurrences of 2564 keywords
|
|
|
Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
78 | Steven Noel, Sushil Jajodia |
Managing attack graph complexity through visual hierarchical aggregation. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
network attack graphs, network attack modeling, vulnerability analysis, clustered graphs |
76 | Jiali Choy, Khoongming Khoo, Chuan-Wen Loe |
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, block cipher, meet-in-the-middle, triple DES |
74 | Katsuyuki Okeya, Kouichi Sakurai |
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems |
72 | Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha |
Relative Doubling Attack Against Montgomery Ladder. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack |
72 | Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002, Dowon Hong |
The Related-Key Rectangle Attack - Application to SHACAL-1. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers |
71 | Siyuan Xin, Xingyuan Chen, Huilin Tang, Ning Zhu |
Research on DoS Atomic Attack Oriented to Attack Resistance Test. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Steven Noel, Michael Jacobs 0001, Pramod Kalapa, Sushil Jajodia |
Multiple Coordinated Views for Network Attack Graphs. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Network attack modeling, network attack graphs, topological vulnerability analysis, graph filtering, graph visualization, graph clustering |
63 | Zhu Ning, Chen Xin-yuan, Zhang Yong-fu, Xin Si-yuan |
Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue |
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing |
Ranking Attack Graphs. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Google PageRank, Model Checking, security metric, Attack Graph, Attack Model |
61 | John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen |
Improving Attack Graph Visualization through Data Reduction and Attack Grouping. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
attack graph visualization, network security analysis, dominator, graph clustering, attack graph |
61 | Yuh-Min Tseng |
Efficient authenticated key agreement protocols resistant to a denial-of-service attack. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Xinzhou Qin, Wenke Lee |
Discovering Novel Attack Strategies from INFOSEC Alerts. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Khoongming Khoo, Guang Gong, Hian-Kiat Lee |
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Time-memory-data trade-off attack, Rainbow attack, Maiorana-McFarland functions |
58 | Hongjun Wu 0001, Bart Preneel |
Resynchronization Attacks on WG and LEX. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack |
58 | Wei-Chi Ku, Hao-Chuan Tsai, Shuai-Min Chen |
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol. |
ACM SIGOPS Oper. Syst. Rev. |
2003 |
DBLP DOI BibTeX RDF |
strong password, password authentication, replay attack, denial-of-service attack, stolen-verifier attack |
57 | Xinming Ou, Wayne F. Boyer, Miles A. McQueen |
A scalable approach to attack graph generation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
enterprise network security, ttack graphs, logic-programming |
55 | Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei 0001, Josef Pieprzyk |
Extensions of the Cube Attack Based on Low Degree Annihilators. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Cube Attack, Low-Degree Annihilators, Algebraic Attack |
55 | Alexander Maximov, Dmitry Khovratovich |
New State Recovery Attack on RC4. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
state recovery attack, RC4, key recovery attack |
55 | Tetsuya Izu, Tsuyoshi Takagi |
Exceptional Procedure Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication |
55 | Werner Schindler |
A Combined Timing and Power Attack. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
Montgomery's algorithm, Timing attack, power attack |
55 | Katsuyuki Okeya, Kouichi Sakurai |
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack |
54 | Jiali Choy, Huihui Yap, Khoongming Khoo |
An Analysis of the Compact XSL Attack on BES and Embedded SMS4. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Compact XSL Attack, ESMS4, BES |
54 | Lan Li, Gyungho Lee |
DDoS Attack Detection and Wavelets. |
Telecommun. Syst. |
2005 |
DBLP DOI BibTeX RDF |
energy distribution, distributed denial of service, wavelet analysis, traffic characterization, attack detection |
54 | Orhun Kara |
Reflection Cryptanalysis of Some Ciphers. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack |
53 | Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang 0002, Chi-Sung Laih |
Generating Attack Scenarios with Causal Relationship. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung |
Modeling Active Cyber Attack for Network Vulnerability Assessment. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Kazumaro Aoki |
Efficient Evaluation of Security against Generalized Interpolation Attack. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
53 | Toru Akishita, Tsuyoshi Takagi |
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny |
53 | Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Ju-Sung Kang |
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
Related key differential attack, XTEA, GOST, Differential characteristic, Distinguishing attack |
51 | Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano |
Success Probability in Chi2-Attacks. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
RC5-64, 2 attack, statistical analysis, RC6 |
51 | Sisi Huang, Zhitang Li, Li Wang 0015 |
Mining Attack Correlation Scenarios Based on Multi-agent System. |
HCI (8) |
2007 |
DBLP DOI BibTeX RDF |
frequent attack sequence, correlation analysis, attack scenario |
50 | Xiaorui Sun, Xuejia Lai |
The Key-Dependent Attack on Block Ciphers. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Key-Dependent Attack, Block Cipher, IDEA |
50 | Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision |
50 | Jungtaek Seo |
An Attack Classification Mechanism Based on Multiple Support Vector Machines. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
attack classification, intrusion detection, Internet security |
50 | Tao Wu, Arun K. Somani |
Cross-talk attack monitoring and localization in all-optical networks. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
diagnosability of attacks, sparse monitoring, attack, crosstalk, all-optical network |
50 | Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey |
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack |
50 | Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang |
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
50 | Wei-Chi Ku |
A hash-based strong-password authentication scheme without using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack |
50 | Sviatoslav B. Braynov, Murtuza Jadliwala |
Representation and analysis of coordinated attacks. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
attack plan, coordinated attack, model checking, attack graph, adversary modelling |
49 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
49 | Chong Hee Kim, Jean-Jacques Quisquater |
Method for Detecting Vulnerability to Doubling Attacks. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
Doubling attack, relative doubling attack, smart card, simple power analysis (SPA), modular exponentiation |
47 | Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen |
Measuring the attack surfaces of two FTP daemons. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
attack surface, attack surface metric, security metric |
46 | Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana |
PrISM: Automatic Detection and Prevention from Cyber Attacks. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention |
46 | Ruiliang Chen, Jung-Min Park 0001, Randolph Marchany |
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Network-level security and protection |
46 | Olivier Thonnard, Wim Mees, Marc Dacier |
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
attack attribution, intelligence monitoring and analysis |
46 | Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu |
Improving cache attacks by considering cipher structure. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Block cipher, Side channel attack, Timing attack, Cache attack |
45 | Li Wang 0015, Zhitang Li, Jie Lei 0004 |
Learning attack strategies through mining and correlation of security alarms. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Atsuko Miyaji, Yuuki Takano |
On the Success Probability of chi2-attack on RC6. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Steven Noel, Sushil Jajodia |
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
45 | ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon |
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Smart card, RSA, Side channel attack, DPA, CRT, Fault attack |
44 | Steven Noel, Eric Robertson 0001, Sushil Jajodia |
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Adam L. Young, Moti Yung |
Bandwidth-Optimal Kleptographic Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory |
43 | Leevar Williams, Richard Lippmann, Kyle Ingols |
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
attack path, visualization, network, recommendation, vulnerability, treemap, security metrics, attack graph, exploit, adversary model |
43 | JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen |
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Smart card, ECC, Side channel attack, Power analysis attack |
43 | Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç |
Cache Based Remote Timing Attack on the AES. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
Remote Attack, AES, Timing Analysis, Side Channel Analysis, Cache Attack |
43 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
Improved Collision Attack on the Hash Function Proposed at PKC'98. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision |
43 | Eric Filiol |
Decimation Attack of Stream Ciphers. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
sequence decimation, multiple clocking, Stream cipher, linear feedback shift register, correlation attack, fast correlation attack |
43 | Steven M. Bellovin |
The Insider Attack Problem Nature and Scope. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Malek Ben Salem 0001, Shlomo Hershkop, Salvatore J. Stolfo |
A Survey of Insider Attack Detection Research. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel |
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
43 | Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz |
8102 Working Group -- Attack Taxonomy. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
43 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov |
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
42 | Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay |
Probability of Attack Based on System Vulnerability Life Cycle. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA |
42 | Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Preimage Attack on the Parallel FFT-Hashing Function. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack |
42 | Zhitang Li, Aifang Zhang, Dong Li, Li Wang 0015 |
Discovering Novel Multistage Attack Strategies. |
ADMA |
2007 |
DBLP DOI BibTeX RDF |
multistage attack, sequential pattern, incremental mining, alert correlation |
42 | Jeannette M. Wing |
Attack graph generation and analysis. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
minimization analysis, model checking, intrusion detection, attack graphs |
42 | Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh |
Scalable network-based buffer overflow attack detection. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks |
42 | Sjouke Mauw, Martijn Oostdijk |
Foundations of Attack Trees. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
semantics, attack trees, threat analysis |
42 | Peng Ning, Dingbang Xu |
Learning attack strategies from intrusion alerts. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
profiling attack strategies, intrusion detection, alert correlation |
42 | Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon |
Difference Distribution Attack on DONUT and Improved DONUT. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation |
42 | Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee |
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. |
ACM SIGOPS Oper. Syst. Rev. |
2003 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
42 | Kouichi Sakurai, Tsuyoshi Takagi |
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack |
41 | Qiuqin Lu, Guangqiu Huang |
An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Mohammad Zulkernine, Mohammad Feroz Raihan, Mohammad Gias Uddin 0001 |
Towards Model-Based Automatic Testing of Attack Scenarios. |
SAFECOMP |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Jesse Sathre, Alex Baumgarten, Joseph Zambreno |
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Ryan Pries, Wei Yu 0002, Xinwen Fu, Wei Zhao 0001 |
A New Replay Attack Against Anonymous Communication Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Susanta Nanda, Tzi-cker Chiueh |
Execution Trace-Driven Automated Attack Signature Generation. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li |
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Nong Ye, Toni Farley, Deepak Lakshminarasimhan |
An attack-norm separation approach for detecting cyber attacks. |
Inf. Syst. Frontiers |
2006 |
DBLP DOI BibTeX RDF |
Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks |
41 | Li Wang 0015, Zhitang Li, Jie Lei 0004, Yao Li 0002 |
A novel algorithm SF for mining attack scenarios model. |
ICEBE |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Somesh Jha, Oleg Sheyner, Jeannette M. Wing |
Two Formal Analys s of Attack Graphs. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
41 | Terence K. T. Law, John C. S. Lui, David K. Y. Yau |
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. |
IEEE Trans. Parallel Distributed Syst. |
2005 |
DBLP DOI BibTeX RDF |
attack traffic filtering, minimum stable time, DDoS attack, traceback |
41 | Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park 0001, Chang Han Kim, Heuisu Ryu |
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
SPA attack, Randomized addition-subtraction chains countermeasure, Side-channel attack, Elliptic curve cryptosystems |
41 | Werner Schindler, François Koeune, Jean-Jacques Quisquater |
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
Error detection, error correction, timing attack, power attack |
40 | Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao |
Towards analyzing complex operating system access control configurations. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
access control, operating systems, attack graph |
40 | Joshua J. Pauli, Patrick Henry Engebretson |
Hierarchy-Driven Approach for Attack Patterns in Software Security Education. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Refinement, Hierarchy, Attack Trees, Attack Patterns |
40 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
40 | Yasuyuki Sakai, Kouichi Sakurai |
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Parallel modular exponentiation, Side channel attack, Montgomery multiplication, Timing attack, RSA cryptosystems |
40 | Thomas A. Berson |
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem |
39 | Saeed Rajput, Jihong Chen, Sam Hsu |
State based authentication. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management |
38 | Steven Noel, Sushil Jajodia |
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. |
J. Netw. Syst. Manag. |
2008 |
DBLP DOI BibTeX RDF |
Topological vulnerability analysis, Intrusion detection, Attack graphs, Sensor placement |
38 | Diptikalyan Saha |
Extending logical attack graphs for efficient vulnerability analysis. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
logic programming, attack graphs, incremental analysis |
38 | Wen Ji, Lei Hu |
Square Attack on Reduced-Round Zodiac Cipher. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Zodiac, square attack, block cipher |
38 | Bahador Bakhshi, Babak Sadeghiyan |
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Blakley’s algorithm, modular multiplication, timing attack, DSA |
38 | Ulf Larson, Emilie Lundin Barse, Erland Jonsson |
METAL - A Tool for Extracting Attack Manifestations. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
Automated attack analysis, log data, intrusion detection, system calls |
38 | James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig |
The sybil attack in sensor networks: analysis & defenses. |
IPSN |
2004 |
DBLP DOI BibTeX RDF |
security, sensor networks, sybil attack |
Displaying result #1 - #100 of 25080 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|