The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
76Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan A prediction-based detection algorithm against distributed denial-of-service attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS)
72Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
68Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
62Adam L. Young, Moti Yung Bandwidth-Optimal Kleptographic Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory
52Dov M. Gabbay Semantics for Higher Level Attacks in Extended Argumentation Frames Part 1: Overview. Search on Bibsonomy Stud Logica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF extended argumentations frames, semantics for attacks on attacks, joint attacks
52Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis
50Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
49Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing
49Frédéric Didier Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast algebraic attacks, Wiedemann’s algorithm, algebraic attacks, algebraic immunity
48Alexei Czeskis, Karl Koscher, Joshua R. Smith 0001, Tadayoshi Kohno RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks
46Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
46Srinivas Mukkamala, Andrew H. Sung Computational Intelligent Techniques for Detecting Denial of Service Attacks. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Zhenghong Wang, Ruby B. Lee New cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, cache, computer architecture, processor, timing attacks, side channel
45Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks
45Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fast Algebraic Attacks, Boolean Functions, Stream Ciphers, Algebraic Attacks, Symmetric Functions, Algebraic Degree
45Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
44Lanjun Dang, Weidong Kou, Yuxia Xiao An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Frederik Armknecht, Matthias Krause 0001, Dirk Stegemann Design Principles for Combiners with Memory. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF combiners with memory, Bluetooth E0, Stream cipher, algebraic attacks, correlation attacks
42Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi Multi-channel Attacks. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA
42Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF application layer attacks, site security monitoring, anomaly detection, information entropy, denial-of-service attacks
42MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
40Chetan Parampalli, R. Sekar 0001, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
40Gaël Hachez, Jean-Jacques Quisquater Montgomery Exponentiation with no Final Subtractions: Improved Results. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF smart cards, Montgomery multiplication, timing attacks, modular exponentiation, power attacks
40Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
39Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel Securing Sensor Nodes Against Side Channel Attacks. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. Search on Bibsonomy ACM Trans. Web The full citation details ... 2008 DBLP  DOI  BibTeX  RDF client transparency, game theory, Web servers, DoS Attacks
39Chong Hee Kim, Philippe Bulens, Christophe Petit 0001, Jean-Jacques Quisquater Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel
39Sanjeev Kumar, Einar Petana Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security
39Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
39Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert Sign Change Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptosystem, smartcards, fault attacks
39Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee 0002, Dowon Hong Padding Oracle Attacks on Multiple Modes of Operation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Padding oracle attacks, Multiple modes of operation, Block ciphers
39Itai Dinur, Adi Shamir Cube Attacks on Tweakable Black Box Polynomials. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium
39Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly Impact of denial of service attacks on ad hoc networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF black hole attacks, ad hoc networks, DoS attacks
39Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt Regional-based authentication against dos attacks in wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service (DoS) attacks, wireless LAN, impersonation attacks
37Shafi Goldwasser Cryptography without (Hardly Any) Secrets ? Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
36Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF waveform matching, RSA, side-channel attacks, modular exponentiation, power-analysis attacks
36Elias Levy Interface Illusions. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Web browser attacks, address-bar spoofing, XUL attacks, hijacking, GUI, attacks, event models
36Arnaud Boscher, Helena Handschuh Masking Does Not Protect Against Differential Fault Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jie Yu 0008, Zhoujun Li 0001, Huowang Chen, Xiaoming Chen A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Dorgham Sisalem, Jiri Kuthan, Sven Ehlert Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Johannes Blömer, Alexander May 0001 New Partial Key Exposure Attacks on RSA. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Kahil Jallad, Jonathan Katz, Bruce Schneier Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Thanh-Ha Le, Cécile Canovas, Jessy Clédière An overview of side channel analysis attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attacks, stochastic model, DPA, DEMA, CPA, template attack
36Igor V. Kotenko, Alexander Ulanov Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cooperative distributed defence, Simulation, DDoS, Network attacks
36Pankaj Kohli, Bezawada Bruhadeshwar FormatShield: A Binary Rewriting Defense against Format String Attacks. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Format String Attacks, Intrusion Detection, System Security, Binary Rewriting
36Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
36Kameswari Kotapati, Peng Liu 0005, Thomas F. La Porta Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile telecommunication networks, Cascading attacks, Infection propagation rules, 3G networks, Vulnerability assessment, Dependency model
36Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan CANDID: preventing sql injection attacks using dynamic candidate evaluations. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic monitoring, retrofitting code, sql injection attacks, symbolic evaluation
36Simon P. Chung, Aloysius K. Mok Advanced Allergy Attacks: Does a Corpus Really Help? Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Allergy Attacks, Intrusion Prevention Systems
36Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure overlay forwarding system, DDoS attacks
36Mustapha Hedabou Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map
36Peng Ning, Dingbang Xu Hypothesizing and reasoning about attacks missed by intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intrusion alert correlation, missed attacks, intrusion detection
36Alefiya Hussain, John S. Heidemann, Christos Papadopoulos A framework for classifying denial of service attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, measurement, time series analysis, denial of service attacks
36Nicolas T. Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations
35Billy Bob Brumley, Risto M. Hakala Cache-Timing Template Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cache-timing attacks, elliptic curve cryptography, side channel attacks
35Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
35Andrey Bogdanov Multiple-Differential Side-Channel Collision Attacks on AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, AES, collision detection, side-channel attacks, DPA
35Andrey Bogdanov Improved Side-Channel Collision Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks
35Onur Aciiçmez, Çetin Kaya Koç Trace-Driven Cache Attacks on AES (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trace-driven attacks, AES, Side-channel Analysis, cache attacks
35An Yu, David S. Brée A Clock-less Implementation of the AES Resists to Power and Timing Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF clock-less circuits, AES, timing attacks, cryptosystems, power attacks
35Nicolas T. Courtois, Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations
35Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque E-NIPS: An Event-Based Network Intrusion Prediction System. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion detection and prediction, attack classes, network security
34Jacques Patarin Security of Random Feistel Schemes with 5 or More Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han On the Security of the Full-Band Image Watermark for Copyright Protection. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Full-band image watermark, constructive attacks, destructive attacks, image embedding, copyright protection, image extraction
33Stefan Tillich, Christoph Herbst Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking
33Shay Gueron, Jean-Pierre Seifert Is It Wise to Publish Your Public RSA Keys? Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks
33Julien Cathalo, François Koeune, Jean-Jacques Quisquater A New Type of Timing Attack: Application to GPS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes
32François-Xavier Standaert, François Koeune, Werner Schindler How to Compare Profiled Side-Channel Attacks?. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Joana Treger, Jacques Patarin Generic Attacks on Feistel Networks with Internal Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set
32Yi Xie 0002, Shun-Zheng Yu A Novel Model for Detecting Application Layer DDoS Attacks. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Xiapu Luo, Rocky K. C. Chang, Edmond W. W. Chan Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. Search on Bibsonomy MASCOTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Wenyuan Xu 0001, Wade Trappe, Yanyong Zhang, Timothy Wood 0001 The feasibility of launching and detecting jamming attacks in wireless networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF jammer detection, denial of service, jamming
32Raphael Chung-Wei Phan Related-Key Attacks on Triple-DES and DESX Variants. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Kevin P. Anchor, Jesse B. Zydallis, Gregg H. Gunsch, Gary B. Lamont Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks. Search on Bibsonomy EMO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Ke Li, Wanlei Zhou 0001, Shui Yu 0001, Bo Dai 0006 Effective DDoS Attacks Detection Using Generalized Entropy Metric. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF generalized entropy, DDoS, attacks detection
32Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier Fault Attacks on RSA Signatures with Partially Unknown Messages. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s theorem, iso/iec 9796-2, digital signatures, rsa, Fault attacks
32Josep Lluis Berral, Nicolás Poggi, Javier Alonso 0001, Ricard Gavaldà, Jordi Torres, Manish Parashar Adaptive distributed mechanism against flooding network attacks based on machine learning. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF DDOS, machine learning, intrusion detection, cooperative, autonomic computing, flooding attacks
32Meiko Jensen, Nils Gruschka, Norbert Luttenberger The Impact of Flooding Attacks on Network-based Services. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Services, availability, DoS, attacks, flooding
32Michael Gorski, Stefan Lucks, Thomas Peyrin Slide Attacks on a Class of Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks
32Yajuan Tang, Xiapu Luo, Rocky K. C. Chang Protecting Internet Services from Low-Rate DoS Attacks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-rate DoS attacks, detection, Feedback control, countermeasures
32Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filter function, stream ciphers, initialization, algebraic attacks, clock-control
32Jonathon T. Giffin, Somesh Jha, Barton P. Miller Automated Discovery of Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IDS evaluation, model-based anomaly detection, model checking, attacks
32Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
32Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Client-Transparent Approach to Defend Against Denial of Service Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers
32Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere Hybrid static-dynamic attacks against software protection mechanisms. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance
32Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau Countermeasures for Preventing Comb Method Against SCA Attacks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication
32André Adelsbach, Stefan Katzenbeisser 0001, Helmut Veith Watermarking schemes provably secure against copy and ambiguity attacks. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF protocol attacks, watermarking, multimedia security
32Philippe Chose, Antoine Joux, Michel Mitton Fast Correlation Attacks: An Algorithmic Point of View. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF match-and-sort, algorithmics, cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, parity-checks
32Raphael Chung-Wei Phan, Soichi Furuya Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule
32Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security Practices, Honeypot, Distributed Denial of Service Attacks
32Sreekanth Malladi, Jim Alves-Foss What are Multi-Protocol Guessing Attacks and How to Prevent Them. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE
32Roman Chertov, Sonia Fahmy, Ness B. Shroff Fidelity of network simulation and emulation: A case study of TCP-targeted denial of service attacks. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-rate TCP-targeted attacks, Simulation, congestion control, TCP, emulation, testbeds, denial of service attacks
32S. Venkatesan 0002, Chenniappan Chellappan Protecting free-roaming mobile agent against multiple colluded truncation attacks. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF colluded attacks, encapsulated offer, free-roaming mobile agent, truncation attacks
32Michael Hutter, Stefan Mangard, Martin Feldhofer Power and EM Attacks on Passive 13.56 MHz RFID Devices. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF EM Attacks, RFID, AES, Side-Channel Attacks, DPA, Power Analysis, DEMA
32Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees
32Itsik Mantin Predicting and Distinguishing Attacks on RC4 Keystream Generator. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Predicting attacks, Cryptanalysis, Stream ciphers, RC4, Distinguishing attacks
32Lars R. Knudsen, Xuejia Lai, Bart Preneel Attacks on Fast Double Block Length Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions
Displaying result #1 - #100 of 35802 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license