The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi An Independent Evaluation of Web Timing Attack and its Countermeasure. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Timing Attack, Countermeasure, Web Application Security
23Marcel Frigault, Lingyu Wang 0001 Measuring Network Security Using Bayesian Network-Based Attack Graphs. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Network, Measuring, Graph, Attack, Bayesian
23Patrick Bas, Gwenaël J. Doërr Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dirty paper trellis watermarking, security, attack
23Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi On Establishing and Fixing a Parallel Session Attack in a Security Protocol. Search on Bibsonomy IDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protocol flaws, parallel session attack, Security protocols
23Amar Aissani Queueing Analysis for Networks Under DoS Attack. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network security, Queueing, Timeout, Steady-state distribution, DoS attack
23Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte Defining categories to select representative attack test-cases. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF classification, evaluation, test, intrusion detection systems, attack
23Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF routing protocols, wireless ad hoc networks, security attack
23Alexandra Czarlinska, Deepa Kundur Attack vs. failure detection in event-driven wireless visual sensor networks. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless visual sensor networks, error detection, attack, event-driven
23Antoine Joux, Thomas Peyrin Hash Functions and the (Amplified) Boomerang Attack. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, SHA-1, boomerang attack
23Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh Forgery attack on the RPC incremental unforgeable encryption scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF incremental encryption, forgery attack
23Soo-Chang Pei, Yi-Chong Zeng Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack identification, visual cryptography, semi-fragile watermarking, multiple-watermark, tamper proofing
23Christopher P. Lee 0001, John A. Copeland Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network attack analysis, team collaboration, user interfaces, information visualization, tagging, folksonomy, parallel coordinates, honeynet
23Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
23Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
23Shih Tsung Liang, Ming-Yi Weng Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP
23Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack
23Gregory J. Conti, Kulsoom Abdullah Passive visual fingerprinting of network attack tools. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization
23Hyung-Woo Lee, Taekyoung Kwon 0002, Hyung-Jong Kim 0002 NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Reflector Attack, Simulation, DDoS, NS-2, IP Traceback
23Yongdong Wu, Feng Bao 0001 Collusion attack on a multi-key secure video proxy scheme. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collusion attack
23Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel Power-Analysis Attack on an ASIC AES implementation. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AES, power analysis attack
23John Loughran, Tom Dowling A Java implemented key collision attack on the data encryption standard (DES). Search on Bibsonomy PPPJ The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key collision attack, Java, DES
23Sarbani Palit, Bimal K. Roy, Arindom De A Fast Correlation Attack for LFSR-Based Stream Ciphers. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF LFSR polynomial, Correlation immune function, Stream cipher, Correlation attack
23Jan Steffan, Markus Schumacher Collaborative attack modeling. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF collaborative knowledge management, security, attack modeling
23Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF stream ciphers, decoding, linear feedback shift registers, fast correlation attack, keystream generators
23Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system
23Miodrag J. Mihaljevic A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Binary sequence generators, MacLaren-Marsaglia shuffler, Cryptanalysis, Distance measures, Correlation attack
22Qiong Liu, Yupu Hu A Fast Correlation Attack via Parallel Computing. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax Fortifying the dalì attack on digital signature. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF E-signature, digital signature, vulnerability analysis
22Jayashree Padmanabhan, K. S. Easwarakumar Traffic Engineering Based Attack Detection in Active Networks. Search on Bibsonomy ICDCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Denial of Service (DoS), active network, traffic characteristics, leaky buckets
22Neil Hurley, Zunping Cheng, Mi Zhang 0001 Statistical attack detection. Search on Bibsonomy RecSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF recommender systems, robustness, collaborative filtering, detection
22Ahren Studer, Adrian Perrig The Coremelt Attack. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes An Improved Attack on TKIP. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22A. Theodore Markettos, Simon W. Moore The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Vijay Srinivasan, John A. Stankovic, Kamin Whitehouse Protecting your daily in-home activity information from a wireless snooping attack. Search on Bibsonomy UbiComp The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel privacy attacks, wireless fingerprinting, activity monitoring
22Tong-Lee Lim, Tieyan Li Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interactive visualization, Internet security
22M. Patrick Collins, Michael K. Reiter On the Limits of Payload-Oblivious Network Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, network intrusion detection, ROC curve
22Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel A Practical Attack on KeeLoq. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks
22Pierre-Alain Fouque, Reynald Lercier, Denis Réal, Frédéric Valette Fault Attack onElliptic Curve Montgomery Ladder Implementation. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jörn-Marc Schmidt, Christoph Herbst A Practical Fault Attack on Square and Multiply. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson 0002, Nimrod Megiddo Adaptive traitor tracing for large anonymous attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, traitor tracing, content protection
22Muthusrinivasan Muthuprasanna, Govindarasu Manimaran Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Zhiwen Wang, Qin Xia, Ke Lu, Jie Zhang An Approach on Detecting Attack Based on Causality in Network Behavior. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Nan Li, Chunhe Xia, Yi Yang, Haiquan Wang An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei Dai Modeling Attack Behaviors in Rating Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
22Alexandre Berzati, Cécile Canovas, Louis Goubin Perturbating RSA Public Keys: An Improved Attack. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA, public key, fault attacks, DFA
22Masashi Une, Akira Otsuka, Hideki Imai Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Sushil Jajodia Topological analysis of network attack vulnerability. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Shiwei Chen, Chenhui Jin An Improved Collision Attack on MD5 Algorithm. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yoshiyuki Higashi, Kazuo Tanaka, Hiroshi Ohtake, Hua O. Wang Construction of simulation model of a flying robot with variable attack angle mechanism. Search on Bibsonomy IROS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Mohammad Feroz Raihan, Mohammad Zulkernine AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jomon Aliyas Paul, Govind Hariharan Hospital capacity planning for efficient disaster mitigation during a bioterrorist attack. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Alex D. Myasnikov, Alexander Ushakov Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Hoang Nguyen, Klara Nahrstedt Attack Containment Framework for Large-Scale Critical Infrastructures. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen 0001 Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Young June Pyun, Douglas S. Reeves Strategic deployment of network monitors for attack attribution. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Thomas Gamer, Michael Scharf, Marcus Schöller Collaborative Anomaly-Based Attack Detection. Search on Bibsonomy IWSOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Liying Li, Jianying Zhou 0001, Ning Xiao DDoS Attack Detection Algorithms Based on Entropy Computing. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DDoS detection, entropy computing, network security
22Gaurav Gupta 0002, Josef Pieprzyk A Low-Cost Attack on Branch-Based Software Watermarking Schemes. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unconditional branch, watermark, software, breakpoint
22Simon P. Chung, Aloysius K. Mok Allergy Attack Against Automatic Signature Generation. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Adaptive Response, Intrusion Prevention
22David Duncombe, George M. Mohay, Andrew J. Clark Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF immunological., intrusion detection, alert correlation
22Ning Liu 0009, K. P. Subbalakshmi Worst Case Attack on Quantization Based Data Hiding. Search on Bibsonomy ISM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng Trojan Horse Attack Strategy on Quantum Private Communication. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Baocang Wang, Yupu Hu Diophantine Approximation Attack on a Fast Public Key Cryptosystem. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation
22Byung Ryong Kim, Ki-Chang Kim A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Sushil Jajodia Topological analysis of network attack vulnerability. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22James A. Muir Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature verification, fault analysis, RSA signatures, hardware faults
22Kris Tiri, Ingrid Verbauwhede A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Ju Liu, Huibo Hu, Jiande Sun 0001, Yu Huang A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Benjamin W. Long Formal Verification of a Type Flaw Attack on a Security Protocol Using Object-Z. Search on Bibsonomy ZB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo AES Power Attack Based on Induced Cache Miss and Countermeasure. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cache, Block Cipher, AES, Power Analysis, Cache Miss
22Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov A Practical Attack on a Braid Group Based Cryptographic Protocol. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Salil S. Kanhere, Anjum Naveed A Novel Tuneable Low-Intensity Adversarial Attack. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Adam Stubblefield, John Ioannidis, Aviel D. Rubin A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wired equivalent privacy, Wireless security
22Alexander Maximov, Thomas Johansson 0001, Steve Babbage An Improved Correlation Attack on A5/1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette The Davies-Murphy Power Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22David Mendonça, Earl E. Lee II, William A. Wallace Impact of the 2001 World Trade Center attack on critical interdependent infrastructures. Search on Bibsonomy SMC (5) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Yi-an Huang, Wenke Lee Attack Analysis and Detection for Ad Hoc Routing Protocols. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Hyung-Woo Lee, Min-goo Kang, Chang-Won Choi PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Voravud Santiraveewan, Yongyuth Permpoontanalarp A Graph-based Methodology for Analyzing IP Spoofing Attack. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP spoofing and Formal Method for Network Security, Network Security, Firewalls
22Hüseyin Demirci, Ali Aydin Selçuk, Erkan Türe A New Meet-in-the-Middle Attack on the IDEA Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Tieyan Li, Yongdong Wu Trust on Web Browser: Attack vs. Defense. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
22Geraint Price A General Attack Model on Hash-Based Client Puzzles. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng An Efficient Known Plaintext Attack on FEA-M. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko Higher Order Differential Attack of Camellia (II). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Yongjin Yeom, Sangwoo Park, Iljun Kim On the Security of CAMELLIA against the Square Attack. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Steven D. Galbraith, Florian Hess, Nigel P. Smart Extending the GHS Weil Descent Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Stefan Mangard A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key Expansion, Smart Cards, AES, Power Analysis, SPA, Key Scheduling
22Kihong Park, Heejo Lee On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Search on Bibsonomy SIGCOMM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Yeping He, Sihan Qing Square Attack on Reduced Camellia Cipher. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Jovan Dj. Golic, Andrew J. Clark, Ed Dawson Generalized Inversion Attack on Nonlinear Filter Generators. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF critical branching processes, inversion of finite automata, Boolean functions, Binary trees, keystream generators
22Thomas S. Messerges Using Second-Order Power Analysis to Attack DPA Resistant Software. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel Attack on Six Rounds of Crypton. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22David A. Wagner 0001 The Boomerang Attack. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Wai W. Fung, James W. Gray III On m-Permutation Protection Scheme Against Modification Attack. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 25080 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license