|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8634 occurrences of 2564 keywords
|
|
|
Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
38 | Jean-François Misarsky |
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Multiplicative attack, redundancy, RSA, LLL algorithm |
38 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
38 | Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo |
An Improvement of Remote User Authentication Scheme Using Smart Cards. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack |
38 | Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo |
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack |
38 | An Braeken, Joseph Lano |
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Combination and filter generator, algebraic attack, correlation attack, distinguishing attack, hardware complexity |
37 | Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel |
Towards Unifying Vulnerability Information for Attack Graph Construction. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Dapeng Man, Bing Zhang, Wu Yang 0001, Wenjin Jin, Yongtian Yang |
A Method for Global Attack Graph Generation. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Measuring the Overall Security of Network Configurations Using Attack Graphs. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Shai Rubin, Somesh Jha, Barton P. Miller |
On the Completeness of Attack Mutation Algorithms. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Bin Zhang 0003, Dengguo Feng |
New Guess-and-Determine Attack on the Self-Shrinking Generator. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Self-shrinking, Guess-and-determine, Stream cipher, Linear feedback shift register (LFSR) |
37 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
37 | Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii |
FMS Attack-Resistant WEP Implementation Is Still Broken. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Sotiris E. Nikoletseas, Grigorios Prasinos, Paul G. Spirakis, Christos D. Zaroliagis |
Attack Propagation in Networks. |
Theory Comput. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Håkan Englund, Martin Hell, Thomas Johansson 0001 |
Two General Attacks on Pomaranch-Like Keystream Generators. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch |
37 | Ya-Fen Chang, Chin-Chen Chang 0001 |
A secure and efficient strong-password authentication protocol. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack |
37 | Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman |
Differential and Linear Cryptanalysis of a Reduced-Round SC2000. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
Symmetric block cipher, SC2000, linear attack, probability, differential attack, characteristic |
36 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel (eds.) |
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
36 | Ravi Sahita, Uday R. Savagaonkar |
Towards a Virtualization-enabled Framework for Information Traceability (VFIT). |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Sara Sinclair, Sean W. Smith |
Preventative Directions For Insider Threat Mitigation Via Access Control. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Virgil D. Gligor, C. Sekar Chandersekaran |
Surviving Insider Attacks: A Call for System Experiments. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Charles P. Pfleeger |
Reflections on the Insider Threat. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jeffrey Hunker |
Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Michael McCormick |
Data Theft: A Prototypical Insider Threat. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Angelos D. Keromytis |
Hard Problems and Research Challenges Concluding Remarks. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk |
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Angelos D. Keromytis |
Hard Problems and Research Challenges. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Kevin S. Killourhy, Roy A. Maxion |
Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak |
The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. |
Insider Attack and Cyber Security |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage |
08102 Outcome Working Group -- Situational Awareness. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
36 | Lothar Braun, Torsten Braun, Georg Carle, Falko Dressler, Anja Feldmann, Dirk Haage, Tobias Limmer, Tanja Zseby |
08102 Working Group -- Measurement Requirements. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
36 | Marc Dacier, Ulrich Flegel, Ralph Holz, Norbert Luttenberger |
08102 Working Group -- Intrusion and Fraud Detection for Web Services. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
36 | Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz |
08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
36 | Joachim Biskup, Bernhard M. Hämmerli, Michael Meier 0001, Sebastian Schmerl, Jens Tölle, Michael Vogel |
08102 Working Group -- Early Warning Systems. |
Network Attack Detection and Defense |
2008 |
DBLP BibTeX RDF |
|
36 | Jean-Sébastien Coron, Avradip Mandal |
PSS Is Secure against Random Fault Attacks. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Probabilistic Signature Scheme, Provable Security, Fault Attacks, Bellcore Attack |
36 | Maher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal |
Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Direct Internal Attack, Security, Fuzzy Logic, Quality Assessment, E-Banking |
36 | Yi Lu 0002, Huaxiong Wang, San Ling |
Cryptanalysis of Rabbit. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit |
36 | Mathew Graves, Mohammad Zulkernine |
Bridging the gap: software specification meets intrusion detector. |
PST |
2006 |
DBLP DOI BibTeX RDF |
attack languages, intrusion detection, software security, software specification |
36 | Joo Yeon Cho, Josef Pieprzyk |
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
SOBER-t32, SOBER-t16, stream ciphers, linearization, Algebraic attack, NESSIE, modular addition, multivariate equations |
36 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 |
Security Analysis of the Generalized Self-shrinking Generator. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Stream cipher, Linear feedback shift register, Fast correlation attack, Clock control, Self-shrinking generator |
36 | Toru Akishita, Tsuyoshi Takagi |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem |
36 | Lin Yang, Meiqin Wang, Siyuan Qiao |
Side Channel Cube Attack on PRESENT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Cube attack, Cryptanalysis, Side channel attack, PRESENT |
36 | Joshua J. Pauli, Patrick Henry Engebretson |
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Refinement, Hierarchy, Attack Trees, Attack Patterns |
36 | Gaeil An, Joon S. Park |
Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack |
36 | Ju Wang 0001, Jonathan C. L. Liu |
Content-based block watermarking against cumulative and temporal attack. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
content-based block selection, cumulative attack, temporal attack, video watermarking scheme, frame synchronization method, video compression |
35 | Amey Shevtekar, Nirwan Ansari |
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee |
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
35 | L. Chaithanya, M. P. Singh, M. M. Gore |
Secure Data Management in Reactive Sensor Networks. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Shai Rubin, Somesh Jha, Barton P. Miller |
Automatic Generation and Analysis of NIDS Attacks. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Sanjay Rawat 0001, Ashutosh Saxena |
Danger theory based SYN flood attack detection in autonomic network. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory |
35 | Jiali Choy, Huihui Yap |
Impossible Boomerang Attack for Block Cipher Structures. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers |
35 | Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 |
On the Improvement of the BDF Attack on LSBS-RSA. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB) |
35 | Niladri B. Puhan, Anthony T. S. Ho |
Secure authentication watermarking for localization against the Holliman-Memon attack. |
Multim. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking |
35 | Joo Yeon Cho, Josef Pieprzyk |
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS |
35 | Markku-Juhani Olavi Saarinen |
A Meet-in-the-Middle Collision Attack Against the New FORK-256. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack |
35 | Joo Yeon Cho, Josef Pieprzyk |
Crossword Puzzle Attack on NLS. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, Linear Approximations, Modular Addition, NLS |
35 | Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz |
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
attack tracks, visualization, intrusion detection |
35 | Debapriyay Mukhopadhyay, Indranil Saha |
Location Verification Based Defense Against Sybil Attack in Sensor Networks. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
Security, Wireless Sensor Network, Triangulation, Sybil attack, Location Verification |
35 | Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Jaeheon Kim, Deukjo Hong |
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Fast correlation attack, Shrinking generator, Self-Shrinking generator, Clock-controlled generator |
35 | Joydip Mitra |
A Near-Practical Attack Against B Mode of HBB. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
known-plaintext attack, HBB, cryptanalysis, stream cipher |
35 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS. |
Workshop on Wireless Security |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
35 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
35 | Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba |
Theoretical Analysis of chi2 Attack on RC6. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
$chi^2$ attack, RC6, Transition Matrix |
35 | Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson |
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher |
35 | Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing |
Automated Generation and Analysis of Attack Graphs. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
model checking, intrusion detection, attack graph |
35 | James Manger |
A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
PKCS, RSA, chosen ciphertext attack, OAEP |
35 | Kazuo Ohta, Kenji Koyama |
Meet-in-the-Middle Attack on Digital Signature Schemes. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Authentication, Digital signature, Hash function, One-way function, Meet-in-the-middle attack |
34 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
33 | Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes |
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Martin Ågren, Thomas Johansson 0001, Martin Hell |
Improving the Rainbow Attack by Reusing Colours. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu |
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Naoki Ogura, Shigenori Uchiyama |
Remarks on the Attack of Fouque et al. against the lIC Scheme. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Jie Ma, Zhitang Li, Weiming Li |
Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy |
On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Panagiotis Rizomiliotis |
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour |
Analysis of the node isolation attack against OLSR-based mobile ad hoc networks. |
ISCN |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Lingyu Wang 0001, Chao Yao, Anoop Singhal, Sushil Jajodia |
Interactive Analysis of Attack Graphs Using Relational Queries. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Michael Gegick, Laurie A. Williams |
Matching attack patterns to security vulnerabilities in software-intensive system designs. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
security, design, regular expression |
33 | John Haggerty, Qi Shi 0001, Madjid Merabti |
Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
33 | P. Vinod 0002, Prabin Kumar Bora |
A New Inter-frame Collusion Attack and a Countermeasure. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Wei Yan, Edwin S. H. Hou, Nirwan Ansari |
Frame-based attack representation and real-time first order logic automatic reasoning. |
ITRE |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey |
A Host-Based Approach to Network Attack Chaining Analysis. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn |
Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Dogan Kesdogan, Lexi Pimenidis |
The Hitting Set Attack on Anonymity Protocols. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Viktor Wahadaniah, Yong Liang Guan 0001, Hock Chuan Chua |
A New Collusion Attack and Its Performance Evaluation. |
IWDW |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Lars R. Knudsen, John Erik Mathiassen |
A Chosen-Plaintext Linear Attack on DES. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
33 | Reginald E. Sawilla, Xinming Ou |
Identifying Critical Attack Assets in Dependency Attack Graphs. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
PageRank, eigenvector, security metric, attack graph |
33 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Secure PAP-Based RADIUS Protocol in Wireless Networks. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
RADIUS protocol, Off-line password guessing attack, Wireless network, Cryptography, Replay attack |
33 | Daniel Boteanu, José M. Fernandez 0001, John McHugh, John Mullins |
Queue Management as a DoS Counter-Measure? |
ISC |
2007 |
DBLP DOI BibTeX RDF |
degradation of service attack, dynamic timeout, timeout, queue management, Denial of service attack |
33 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
On the Collision Resistance of RIPEMD-160. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack |
33 | Joseph Bonneau, Ilya Mironov |
Cache-Collision Timing Attacks Against AES. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, timing attack |
33 | Jian Yuan, Kevin L. Mills |
Monitoring the Macroscopic Effect of DDoS Flooding Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
attack dynamics, spatial-temporal pattern, monitoring, network traffic, DDoS attack |
33 | Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha |
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack |
33 | Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel |
A New Keystream Generator MUGI. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
PANAMA, Re-synchronization attack, Block cipher, Related-key attack, Keystream generator |
32 | Nobuyuki Sugio, Shunichi Nambu, Toshinobu Kaneko |
A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
internal collisions, AES, side channel attacks, birthday paradox |
32 | Zunping Cheng, Neil Hurley |
Effective diverse and obfuscated attacks on model-based recommender systems. |
RecSys |
2009 |
DBLP DOI BibTeX RDF |
recommender systems, collaborative filtering, detection, attack, obfuscation |
32 | Scott O'Hare, Steven Noel, Kenneth Prole |
A Graph-Theoretic Visualization Approach to Network Risk Analysis. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment |
32 | Juan Wang, Jingwei Zhang, Huanguo Zhang |
Type Flaw Attacks and Prevention in Security Protocols. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
type flaw attack, GDOI, security protocol |
Displaying result #101 - #200 of 25080 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|