|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8634 occurrences of 2564 keywords
|
|
|
Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Leonie Simpson, Jovan Dj. Golic, Ed Dawson |
A Probabilistic Correlation Attack on the Shrinking Generator. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Cryptography, Stream ciphers, Correlation attacks, Shrinking generator |
22 | Chae Hoon Lim, Pil Joong Lee |
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
22 | Eli Biham, Alex Biryukov |
An Improvement of Davies' Attack on DES. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Yvo Desmedt, Andrew M. Odlyzko |
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
22 | Jie Wang 0001, Raphael C.-W. Phan, John N. Whitley, David J. Parish |
Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Augmented Attack Tree, Modeling, DDoS, Bottom-up, Detection Algorithm |
22 | Michael Kohnen, Mike Leske, Erwin P. Rathgeb |
Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
P2P security, Eclipse attack, Sybil attack, Kad |
22 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
22 | Yuichi Sei, Shinichi Honiden |
Reporter node determination of replicated node detection in wireless sensor networks. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
node compromising attack, node replication attack, security, wireless sensor networks, algorithm |
22 | Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan |
Side Channels in the McEliece PKC. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
side channel attack, timing attack, post quantum cryptography |
22 | Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng |
New Differential-Algebraic Attacks and Reparametrization of Rainbow. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
oil-and-vinegar, rank, algebraic attack, differential attack |
22 | Yuichi Sei, Shinichi Honiden |
Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
node compromising attack, node replication attack, security, wireless sensor networks, algorithm |
22 | Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 |
A GF(p) elliptic curve group operator resistant against side channel attacks. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack |
22 | Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang |
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack |
22 | Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis |
An Adaptive Policy-Based Approach to SPIT Management. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
SPIT, Policy, VoIP, Rules, Actions, Attack Graphs, Attack Trees |
22 | Eli Biham, Yaniv Carmeli, Adi Shamir |
Bug Attacks. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Bug attack, Pohlig-Hellman, RSA, ECC, Fault attack |
22 | Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury |
A Near Optimal S-Box Design. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Cellular Automata, Algebraic Attack, S-box, Power Attack |
20 | Kwangsoo Lee, Andreas Westfeld, Sangjin Lee 0002 |
Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 |
Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. |
ISPA |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Yongzhuang Wei, YuPu Hu |
New related-key rectangle attacks on reduced AES-192 and AES-256. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack |
20 | Xiangui Kang, Jiwu Huang, Wenjun Zeng, Yun Q. Shi 0001 |
Non-ambiguity of blind watermarking: a revisit with analytical resolution. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Abstract watermarking, ambiguity attack, PRSG sequence, computational indistinguishability, digital rights management (DRM) |
20 | Norman Danner, Danny Krizanc, Marc Liberatore |
Detecting Denial of Service Attacks in Tor. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
reliability, Anonymity, denial of service, detection, attack |
20 | Honglong Chen, Wei Lou, Zhi Wang 0003 |
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs. |
WASA |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, Consistency, wormhole attack, secure localization |
20 | Florian Mendel, Christian Rechberger, Martin Schläffer |
Cryptanalysis of Twister. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Twister, hash function, collision-, preimage attack, SHA-3, second-preimage- |
20 | Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng |
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
On-line/off-line signature, Forgeability, Attack, Security Analysis |
20 | Thibault Cholez, Isabelle Chrisment, Olivier Festor |
Evaluation of Sybil Attacks Protection Schemes in KAD. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
security, DHT, P2P networks, Sybil attack, KAD, defense |
20 | Sebastiaan Indesteege, Bart Preneel |
Practical Collisions for EnRUPT. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
EnRUPT, hash function, collision attack, SHA-3 candidate |
20 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
20 | Philipp Grabher, Johann Großschädl, Dan Page |
Non-deterministic processors: FPGA-based analysis of area, performance and security. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design |
20 | Kun Peng, Feng Bao 0001 |
A Design of Secure Preferential E-Voting. |
VoteID |
2009 |
DBLP DOI BibTeX RDF |
preferential e-voting, coercion attack, security |
20 | Hongjie He, Jiashu Zhang, Heng-Ming Tai |
Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. |
Information Hiding |
2009 |
DBLP DOI BibTeX RDF |
block-neighborhood characterization, constant-average attack, fragile watermarking, self-recovery |
20 | Thanh-Ha Le, Cécile Canovas, Jessy Clédière |
An overview of side channel analysis attacks. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
side channel attacks, stochastic model, DPA, DEMA, CPA, template attack |
20 | Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters |
Attacking and Defending the McEliece Cryptosystem. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
Stern attack, minimal weight code word, list decoding binary Goppa codes, security analysis, McEliece cryptosystem |
20 | Sanjam Garg, Huzur Saran |
Anti-DDoS Virtualized Operating System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Performance, Virtualization, Malware, Distributed Denial of Service Attack |
20 | Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park |
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack |
20 | Xiangbin Cheng, Jun Bi, Xing Li |
Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
IPv6, Shim6, DoS attack |
20 | Stéphane Manuel, Thomas Peyrin |
Collisions on SHA-0 in One Hour. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
hash functions, SHA-0, boomerang attack |
20 | Florian Mendel, Martin Schläffer |
Collisions for Round-Reduced LAKE. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision attack |
20 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
20 | Michael Gorski, Stefan Lucks |
New Related-Key Boomerang Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
20 | Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi |
Cryptanalysis of MV3 Stream Cipher. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
MV3 Algorithm, Cryptanalysis, Stream Ciphers, Distinguishing Attack |
20 | Youngsook Lee, Junghyun Nam, Dongho Won |
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
distributed system, smart card, impersonation attack, authentication scheme |
20 | Michael P. O'Mahony, Barry Smyth |
Collaborative web search: a robustness analysis. |
Artif. Intell. Rev. |
2007 |
DBLP DOI BibTeX RDF |
Malicious attack, Robustness, Personalisation, Collaborative web search |
20 | Chong Hee Kim, Jean-Jacques Quisquater |
Faults, Injection Methods, and Fault Attacks. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
fault injection, fault, fault attack, cryptographic algorithm |
20 | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig |
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing |
20 | Yacine Djemaiel, Noureddine Boudriga |
A global marking scheme for tracing cyber attacks. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
global marking, malicious activity, digital investigation, security attack |
20 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
20 | Daewan Han, Myung-Hwan Kim, Yongjin Yeom |
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack |
20 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
20 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Message Difference for MD4. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Message Difference, Hash Function, Collision Attack, MD4, Local Collision, Differential Path |
20 | Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim 0001 |
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Eagle-64, Eagle-128, Related-key Amplified Boomerang Attack, Block Ciphers, Data-Dependent Operations |
20 | Ikkyun Kim, Koohong Kang, Yangseo Choi, Daewon Kim, Jintae Oh, Kijun Han |
A Practical Approach for Detecting Executable Codes in Network Traffic. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
zero-day attack, malicious code, signature generation |
20 | Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka |
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Bleichenbacher’s forgery attack, RSASSA-PKCS-v1_5, time-stamp forgery, Acrobat, Acrobat Reader |
20 | David Jao, S. Ramesh Raju, Ramarathnam Venkatesan |
Digit Set Randomization in Elliptic Curve Cryptography. |
SAGA |
2007 |
DBLP DOI BibTeX RDF |
randomized representations, non-adjacent form representations, side channel attack countermeasures, elliptic curve cryptography |
20 | Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten |
Differential Power Analysis of Stream Ciphers. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain |
20 | Hua Chen 0011, Wenling Wu, Dengguo Feng |
Differential Fault Analysis on CLEFIA. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Generalized Feistel Structure, Differential Fault Attack, Block Cipher |
20 | Martin Hell, Thomas Johansson 0001 |
Cryptanalysis of Achterbahn-Version 2. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream ciphers, key recovery attack |
20 | Hongjun Wu 0001, Bart Preneel |
Cryptanalysis of the Stream Cipher ABC v2. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
key-dependent S-box, ABC v2, stream cipher, Fast correlation attack |
20 | Jian Yin 0006, Sanjay Kumar Madria |
A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
Black hole attack, Sensor networks |
20 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators |
20 | Roland Rieke |
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection |
20 | Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim |
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow attack |
20 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
20 | Dag Arne Osvik, Adi Shamir, Eran Tromer |
Cache Attacks and Countermeasures: The Case of AES. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, memory access |
20 | Yongsu Park, Yong Ho Song, Eul-Gyu Im |
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow attack |
20 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation |
20 | Tanmoy Kanti Das, Jianying Zhou 0001 |
Cryptanalysis of Barni et al. Watermarking Scheme. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Watermark Recovery, Copy Attack, Cryptanalysis, Wavelet Transform |
20 | An Braeken, Bart Preneel |
Probabilistic Algebraic Attacks. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Walsh spectrum, combination and filter generator, Algebraic attack, algebraic immunity, annihilator |
20 | Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede |
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure |
20 | Gwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé |
Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
block replacement attack, intra-signal collusion, self-similarities |
20 | Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 |
Matching Connection Pairs. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor |
20 | Kai Schramm, Thomas J. Wollinger, Christof Paar |
A New Class of Collision Attacks and Its Application to DES. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
internal collisions, side channel attacks, power analysis, DES, S-Boxes, collision attack |
20 | Chik How Tan, Xun Yi, Chee Kheong Siew |
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers |
20 | Ulrich Kühn 0001 |
Improved Cryptanalysis of MISTY1. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential |
20 | Hitoshi Yanami, Takeshi Shimoyama |
Differential Cryptanalysis of a Reduced-Round SEED. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
symmetric block cipher, probability, differential attack, characteristic, SEED |
20 | Philip Hawkes, Frank Quick, Gregory G. Rose |
A Practical Cryptanalysis of SSC2. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
SSC2, fast correlation attack |
20 | Zhi-Guo Chen, Stafford E. Tavares |
Toward Provable Security of Substitution-Permutation Encryption Networks. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
XOR table, block cipher, provable security, nonlinearity, differential attack |
20 | Daniel Bleichenbacher |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
PKCS, RSA, SSL, chosen ciphertext attack |
20 | Thomas Jakobson |
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes |
20 | Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway |
Relations Among Notions of Security for Public-Key Encryption Schemes. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness |
20 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein |
Surviving information warfare attacks on databases. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency |
20 | Richard E. Smith |
Mandatory Protection for Internet Server Software. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
19 | Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen |
Stealthy deception attacks on water SCADA systems. |
HSCC |
2010 |
DBLP DOI BibTeX RDF |
secure control systems, switching pdes, water mangement |
19 | Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis |
Deep packet anonymization. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Manabu Inuma, Akira Otsuka, Hideki Imai |
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Rui Wang 0010, Yong Fuga Li, XiaoFeng Wang 0001, Haixu Tang, Xiao-yong Zhou |
Learning your identity and disease from research papers: information leaks in genome wide association study. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
genome wide association study, test statistics, integer programming, markov model, single nucleotide polymorphism |
19 | Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
DNS spoofing, MITM attacks, SIP, VoIP security |
19 | Leila Amgoud, Philippe Besnard |
Bridging the Gap between Abstract Argumentation Systems and Logic. |
SUM |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Kifer |
Attacks on privacy and deFinetti's theorem. |
SIGMOD Conference |
2009 |
DBLP DOI BibTeX RDF |
random worlds, privacy |
19 | Yu Sasaki, Kazumaro Aoki |
Finding Preimages in Full MD5 Faster Than Exhaustive Search. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
splice-and-cut, hash function, MD5, preimage, one-way, local collision |
19 | Itai Dinur, Adi Shamir |
Cube Attacks on Tweakable Black Box Polynomials. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium |
19 | Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic |
Speeding up Collision Search for Byte-Oriented Hash Functions. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
19 | Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang |
Projecting Cyberattacks Through Variable-Length Markov Models. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hakem Beitollahi, Geert Deconinck |
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Huaqun Wang, Hong Yu |
Cryptanalysis of Two Ring Signcryption Schemes. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography |
19 | Amin Hassanzadeh, Babak Sadeghian |
Intrusion Detection with Data Correlation Relation Graph. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
correlation relation graph, synflood, regression line, intrusion detection, correlation coefficient, data correlation |
19 | Shui Yu 0001, Wanlei Zhou 0001 |
Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath |
Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary |
The Quest for Multi-headed Worms. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Junko Takahashi, Toshinori Fukunaga |
Improved Differential Fault Analysis on CLEFIA. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 25080 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|