The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Attack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Jian-min Han, Ting-ting Cen, Huiqun Yu An Improved V-MDAV Algorithm for l-Diversity. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Homogeneity Attack, Background Knowledge Attack, K-Anonymity, L-Diversity
25Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo 0001, Huaxiong Wang Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LSBS-RSA, short exponent attack, lattice reduction technique, the Boneh-Durfee attack, RSA, least significant bits (LSBs)
25María Naya-Plasencia Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
25Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Response Agent (RA), Topology Dependency Index (TDI), Attack Damage Index (ADI), adaptive isolation, attack damage, response cost, MANET
25Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set
25Youngsook Lee, Junghyun Nam, Dongho Won Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF parallel session attack, smart card, password, Authentication scheme, reflection attack
25Hongjie He, Jiashu Zhang, Heng-Ming Tai A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF the vector quantization attack, the transplantation attack, discrete wavelet transform (DWT), fragile watermarking
25Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
25Zhitang Li, Wei Guo, Fuquan Xu Dependable Propagating Routing Information in MANET. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Passive Attack, Mobile Ad Hoc Networks, Active Attack, Secure Routing Protocol, Routing Discovery
25Christophe Giraud 0001, Erik Woodward Knudsen Fault Attacks on Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature
25JaeCheol Ha, Sang-Jae Moon Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form
25Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
24Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi Application of artificial neural network in detection of DOS attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack
24Peter Ebinger, Malcolm Parsons Measuring the impact of attacks on the performance of mobile ad hoc networks. Search on Bibsonomy PE-WASUN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance evaluation, attack, performance metrics, manet, black hole
24Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 Preimages for Step-Reduced SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256
24Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
24Artemios G. Voyiatzis, Dimitrios N. Serpanos The security of the Fiat-Shamir scheme in the presence of transient hardware faults. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack
24Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Ad Hoc Networks, Intrusion Detection, Wormhole Attack
24Guang Gong Sequences, DFT and Resistance against Fast Algebraic Attacks. Search on Bibsonomy SETA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fast algebraic attack, bases, trace representations, stream ciphers, Discrete Fourier transform, polynomials, LFSR, m-sequences
24Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata Higher Order Differential Attacks on Reduced-Round MISTY1. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CRYPTREC, higher order differential attack, MISTY1, block cipher, NESSIE
24Florian Mendel, Vincent Rijmen Cryptanalysis of the Tiger Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision
24Hesiri Weerasinghe, Huirong Fu Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cooperative Black Hole attack, MANET, AODV
24Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
24Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai Algebraic Cryptanalysis of 58-Round SHA-1. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gröbner basis, SHA-1, differential attack
24Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee 0001, Jongin Lim 0001 Classification of Key Management Schemes for Wireless Sensor Networks. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, key management, guideline, attack model
24Jungwon Kim, Peter J. Bentley, Christian Wallenta, Mohamed Ahmed 0001, Stephen Hailes Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. Search on Bibsonomy ICARIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Interest Cache Poisoning Attack, Sensor Networks, Artificial Immune Systems, Danger Theory
24Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam Effect of Malicious Synchronization. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity
24Siho Kim, Keun-Sung Bae Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Amplitude scaling attack, Quantization-based, Quantization step size, Audio watermarking
24John Kelsey, Stefan Lucks Collisions and Near-Collisions for Reduced-Round Tiger. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function, attack, collisions, Tiger
24Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong Algebraic Attacks on Clock-Controlled Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF irregular clocking, stream cipher, linear feedback shift register, algebraic attack, clock control
24Xiping He, Qingsheng Zhu, Ping Gu A New Chaos-Based Encryption Method for Color Image. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ergodic matrix, encryption, attack, diffusion, S-box, confusion, Chaotic map
24Eun-Jun Yoon, Kee-Young Yoo Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, Network security, Hash function, Password authentication, Diffie-Hellman, Stolen-verifier attack
24Nong Ye, Toni Farley A Scientific Approach to Cyberattack Detection. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cyberattack detection, Attack-norm separation, Signal detection models, Detection systems, Security and privacy
24Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo Robust and Simple Authentication Protocol for Secure Communication on the Web. Search on Bibsonomy ICWE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Denning-Sacco attack, Security, Authentication, Cryptography, Smart card, Key establishment, Forward Secrecy
24Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security IC, encryption, smart card, side-channel attack, differential power analysis, countermeasure
24Sung-Woon Lee, Hyun-Sung Kim 0001, Kee-Young Yoo Cryptanalysis of a user authentication scheme using hash functions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, cryptography, hash function, password, guessing attack
24Jinn-ke Jan, Yi-Hwa Chen A New Efficient MAKEP for Wireless Communications. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Wireless network, key distribution, Key exchange, Mutual authentication, Man-in-the-middle attack
24Jonathan J. Hoch, Adi Shamir Fault Analysis of Stream Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4
24Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
24Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone Vidmar Are E-Commerce Users Defenceless? Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Run time modification, Security, E-commerce, Attack
24Kouichi Sakurai, Tsuyoshi Takagi On the Security of a Modified Paillier Public-Key Primitive. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack
24Paul C. Kocher Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman
24Paul C. van Oorschot, Michael J. Wiener Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF parallel collision search, low Hamming weight exponents, cryptanalysis, DES, Meet-in-the-middle attack
24Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility
24Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen 0001, Jian-bin Hu A New Method to Generate Attack Graphs. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF host access graph, sub-attack graph, network security, attack graphs
23Xiaorui Sun, Xuejia Lai Improved Integral Attacks on MISTY1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki Modeling Misuse Patterns. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer Rebound Distinguishers: Results on the Full Whirlpool Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, distinguisher, near-collision
23Yu Sasaki, Kazumaro Aoki Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RIPEMD, double branch, preimage, meet-in-the-middle
23Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen Cryptanalysis of MDC-2. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDC-2, hash function, collision, preimage
23Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovich Content Delivery Networks: Protection or Threat? Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Erik Tews, Martin Beck Practical attacks against WEP and WPA. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip
23Tao Zhang, Chong Wu Network Security Analysis Based on Security Status Space. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Michael Kara-Ivaniov, Eran Iceland, Aviad Kipnis Attacks on Authentication and Signature Schemes Involving Corruption of Public Key (Modulus). Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Elie Bursztein Extending Anticipation Games with Location, Penalty and Timeline. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay A Survey of Bots Used for Distributed Denial of Service Attacks. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Qingfeng Chen, Shichao Zhang 0001, Yi-Ping Phoebe Chen Identifying Dependency Between Secure Messages for Protocol Analysis. Search on Bibsonomy KSEM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Mihui Kim, Jaewon Seo, Kijoon Chae Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. Search on Bibsonomy SEUS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Eli Biham, Orr Dunkelman, Nathan Keller Improved Slide Attacks. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe Generalized Correlation Analysis of Vectorial Boolean Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Vectorial Boolean Functions, Unrestricted Nonlinearity, Resiliency
23Hongli Luo, Mei-Ling Shyu Defense against Bandwidth Attacks with Traffic Resource Management. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Shishir Nagaraja, Ross J. Anderson Dynamic Topologies for Robust Scale-Free Networks. Search on Bibsonomy BIOWIRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF covert groups, security, robustness, topology, Scale-free networks
23Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 Wormhole attacks in wireless networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Shai Rubin, Somesh Jha, Barton P. Miller Protomatching network traffic for high throughputnetwork intrusion detection. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection, signatures, protocol analysis
23Sherif M. Khattab, Daniel Mossé, Rami G. Melhem Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Wei Li 0025, Rayford B. Vaughn Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Kaoru Kurosawa, Swee-Huay Heng Relations Among Security Notions for Undeniable Signature Schemes. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature
23Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Sanjeev Kumar, Montasir Azad, Orifiel Gomez, R. Valdez Can Microsoft's Service Pack2 (SP2) Security Software Prevent SMURF Attacks? Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai Some Remarks on Security of Receipt-Free E-auction. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Bid-rigging, Bid-collusion, security, Cryptography, Receipt-freeness, E-auction
23Kazuhiro Ohno, Hideki Koike, Kanba Koizumi IPMatrix: An Effective Visualization Framework for Cyber Threat Monitoring. Search on Bibsonomy IV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information visualization, intrusion detection, information security, Internet worm, computer virus
23Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Boomerang and Rectangle Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Wenling Wu, Wentao Zhang, Dengguo Feng Integral Cryptanalysis of Reduced FOX Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Chao-Yong Hsu, Chun-Shien Lu Near-perfect cover image recovery anti-multiple watermark embedding approaches. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Yi Shi, Xinyu Yang A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Lau Nga Sin, Moon-Chuen Lee An Efficient Domain Based Marking Scheme for IP Traceback. Search on Bibsonomy HSNMC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Haibin Sun, John C. S. Lui, David K. Y. Yau Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Kwun Yin Yu IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Dingbang Xu, Peng Ning Alert Correlation through Triggering Events and Common Resources. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Giampaolo Bella A Protocol's Life After Attacks... (Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Paul Ammann, Duminda Wijesekera, Saket Kaushik Scalable, graph-based network vulnerability analysis. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF monotonic analysis, model checking, scalability, network security, vulnerability, exploit
23Vladimir I. Gorodetski, Igor V. Kotenko Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Eli Biham, Orr Dunkelman, Nathan Keller New Results on Boomerang and Rectangle Attacks. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye Improved Truncated Differential Attacks on SAFER. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Alejandro Hevia, Marcos A. Kiwi Strength of Two Data Encryption Standard Implementations under Timing Attacks. Search on Bibsonomy LATIN The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Jovan Dj. Golic, Luke O'Connor Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
23Michael J. Wiener Cryptanalysis of Short RSA Secret Exponents (Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
23Andrew J. Clark Physical Protection of Cryptographic Devices. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
23Jiqiang Lu Related-key rectangle attack on 36 rounds of the XTEA block cipher. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF XTEA, Block cipher, Related-key rectangle attack
23Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer Rebound Attack on the Full Lane Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3
23Nan Wang, Lin Wang, Yanlong Bu, Guozhong Zhang, Lincheng Shen Tactical Aircraft Pop-Up Attack Planning Using Collaborative Optimization. Search on Bibsonomy ICIC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pop-up attack, weapon delivery, collaborative optimization, planning, law, response surface
23John Dunagan, Alice X. Zheng, Daniel R. Simon Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs. Search on Bibsonomy SOSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity snowball, machine learning, support vector machine, authentication, access control, combinatorial optimization, attack graph, sparsest cut
23Kota Ideguchi, Dai Watanabe Second Preimage Attack on SHAMATA-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, second preimage attack, SHA-3 candidate
23Peng Zhang, Bing Sun 0001, Chao Li 0002 Saturation Attack on the Block Cipher HIGHT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HIGHT, Saturation attack, Block cipher, Distinguisher
23Martin Hlavác Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem
23Haina Zhang, Lin Li, Xiaoyun Wang 0001 Fast correlation attack on stream cipher ABC v3. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC v3, cryptanalysis, stream cipher, fast correlation attack
23Xiao Pan, Jianliang Xu, Xiaofeng Meng 0001 Protecting location privacy against location-dependent attack in mobile services. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF lbs, location-dependent attack, location privacy
23Chetan Parampalli, R. Sekar 0001, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
23Michael Gegick Failure-prone components are also attack-prone components. Search on Bibsonomy OOPSLA Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-prone component
Displaying result #401 - #500 of 25080 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license