The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Jaroslaw Skaruz, Franciszek Seredynski Recurrent neural networks towards detection of SQL attacks. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mihui Kim, Jaewon Seo, Kijoon Chae Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. Search on Bibsonomy SEUS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Wei Chen 0006, Danwei Chen, Guozi Sun, Yingzhou Zhang Defending Against Jamming Attacks in Wireless Local Area Networks. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Eli Biham, Orr Dunkelman, Nathan Keller Improved Slide Attacks. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yi Xie 0002, Shun-Zheng Yu Detecting Shrew HTTP Flood Attacks for Flash Crowds. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Frederic Stumpf, Patrick Röder, Claudia Eckert 0001 An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jaroslaw Skaruz, Franciszek Seredynski, Pascal Bouvry Tracing SQL Attacks Via Neural Networks. Search on Bibsonomy PPAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Elisabeth Oswald, Stefan Mangard Template Attacks on Masking - Resistance Is Futile. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Joseph H. Silverman, William Whyte Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Ki-Yoon Kim, Hyoung-Kee Choi A Symptom-Based Taxonomy for an Early Detection of Network Attacks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
19Manish C. Kumar, K. Gopinath Recovery from DoS Attacks in MIPv6: Modeling and Validation. Search on Bibsonomy SEFM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Kotikalapudi Sriram, Doug Montgomery, Oliver Borchert, Okhee Kim, D. Richard Kuhn Study of BGP Peering Session Attacks and Their Impacts on Routing Performance. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Gal Badishi, Idit Keidar, Amir Sasson Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF reliability, Distributed applications, distributed programming, availability and serviceability
19Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kothari Preventing SQL Injection Attacks in Stored Procedures. Search on Bibsonomy ASWEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Stephen Frechette, Dimiter R. Avresky A Proxy Network Topology and Reconfiguration Algorithm for Resistance to DoS Attacks. Search on Bibsonomy NCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Zhouxuan Teng, Wenliang Du Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Peter Ebinger, Tobias Bucher Modelling and Analysis of Attacks on the MANET Routing in AODV. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Nils Gruschka, Norbert Luttenberger Protecting Web Services from DoS Attacks by SOAP Message Validation. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Wentao Zhang, Wenling Wu, Lei Zhang 0012, Dengguo Feng Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, cryptanalysis, AES, impossible differentials
19Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic Noxes: a client-side solution for mitigating cross-site scripting attacks. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Cas Cremers Feasibility of Multi-Protocol Attacks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Takuo Nakashima, Shunsuke Oshima A Detective Method for SYN Flood Attacks. Search on Bibsonomy ICICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Detective Method, DoS, Attack, SYN Flood
19Lei Guang, Chadi Assi, Abderrahim Benslimane Interlayer Attacks in Mobile Ad Hoc Networks. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Ad hoc networks, medium access control
19Emmanuel Hooper An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Bo Yu 0019, Bin Xiao 0001 Detecting selective forwarding attacks in wireless sensor networks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Min Wu 0005, Robert C. Miller, Simson L. Garfinkel Do security toolbars actually prevent phishing attacks? Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-commerce, user study, user interface design, world wide web and hypermedia
19François-Xavier Standaert, François Macé, Eric Peeters, Jean-Jacques Quisquater Updates on the Security of FPGAs Against Power Analysis Attacks. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Igor V. Kotenko, Alexander Ulanov Simulation of Internet DDoS Attacks and Defense. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security
19Dong-Ho Kang, Byoung-Koo Kim, Jintae Oh, Taek Yong Nam, Jong-Soo Jang FPGA Based Intrusion Detection System Against Unknown and Known Attacks. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Protocol Anomaly Detection, Intrusion Detection, Network Security
19Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kothari Eliminating SQL Injection Attacks - A Transparent Defense Mechanism. Search on Bibsonomy WSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19An Braeken, Joseph Lano, Bart Preneel Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Jacques J. A. Fournier, Michael Tunstall Cache Based Power Analysis Attacks on AES. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Theodor Richardson Preventing Attacks on Back-End Servers using Masquerading/Honeypots. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Christos Xenakis, Lazaros F. Merakos Vulnerabilities and Possible Attacks Against the GPRS Backbone Network. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Fanglu Guo, Jiawu Chen, Tzi-cker Chiueh Spoof Detection for Preventing DoS Attacks against DNS Servers. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Byoung-Joon Min, Seung Hwan Yoo, Jongho Ryu, Dong Il Seo Return on Security Investment Against Cyber Attacks on Availability. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
19Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei Tracing the Event Evolution of Terror Attacks from On-Line News. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security informatics, event evolution, topic detection and tracking
19Robin D. Burke, Bamshad Mobasher, Chad Williams, Runa Bhaumik Detecting Profile Injection Attacks in Collaborative Recommender Systems. Search on Bibsonomy CEC/EEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Sanjeev Kumar, Montasir Azad, Orifiel Gomez, R. Valdez Can Microsoft's Service Pack2 (SP2) Security Software Prevent SMURF Attacks? Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Men Long, Chwan-Hwa John Wu, John Y. Hung Denial of service attacks on network-based control systems: impact and mitigation. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19John Haggerty, Qi Shi 0001, Madjid Merabti Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jian Yuan, Kevin L. Mills Monitoring the Macroscopic Effect of DDoS Flooding Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack dynamics, spatial-temporal pattern, monitoring, network traffic, DDoS attack
19Xiapu Luo, Rocky K. C. Chang Optimizing the Pulsing Denial-of-Service Attacks. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Prem Uppuluri, Uday Joshi, Arnab Ray Preventing race condition attacks on file-systems. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, race conditions, system calls
19Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Honeypots, Forensics, Honeynets
19Yuji Soejima, Eric Y. Chen, Hitoshi Fuji Detecting DDoS Attacks by Analyzing Client Response Patterns. Search on Bibsonomy SAINT Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Tadeusz Pietraszek, Chris Vanden Berghe Defending Against Injection Attacks Through Context-Sensitive String Evaluation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Sufatrio, Roland H. C. Yap Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Chun-Shien Lu, Chia-Mu Yu On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Boomerang and Rectangle Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Hongli Luo, Mei-Ling Shyu The Protection of QoS for Multimedia Transmission against Denial of Service Attacks. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Thierry P. Berger, Marine Minier Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream cipher, algebraic attack
19Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Luke O'Connor On Blending Attacks for Mixes with Memory. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jason Waddle, David A. Wagner 0001 Fault Attacks on Dual-Rail Encoded Systems. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Gal Badishi, Idit Keidar, Amir Sasson Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano Success Probability in Chi2-Attacks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RC5-64, 2 attack, statistical analysis, RC6
19François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel Power Analysis Attacks Against FPGA Implementations of the DES. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Srinivas Mukkamala, Andrew H. Sung A framework for countering denial of service attacks. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Christophe Giraud 0001, Erik Woodward Knudsen Fault Attacks on Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature
19Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao Zhang 0037 Attacks and risk analysis for hardware supported software copy protection systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attack, tamper resistance, copy protection
19Nicolas T. Courtois Algebraic Attacks on Combiners with Memory and Several Outputs. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Dong Xuan, Sriram Chellappan, Xun Wang, Shengquan Wang Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Mina Guirguis, Azer Bestavros, Ibrahim Matta Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Yang Xiang 0001, Wanlei Zhou 0001 Protect Grids from DDoS Attacks. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Guangzhi Qu, Salim Hariri, Santosh Jangiti, Suhail Hussain, Seungchan Oh, Samer Fayssal, Mazin S. Yousif Abnormality Metrics to Detect and Protect against Network Attacks. Search on Bibsonomy ICPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Philip Hawkes, Gregory G. Rose Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Suan Hsi Yong, Susan Horwitz Protecting C programs from attacks via invalid pointer dereferences. Search on Bibsonomy ESEC / SIGSOFT FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, static analysis, instrumentation, buffer overrun
19Eli Biham, Orr Dunkelman, Nathan Keller Rectangle Attacks on 49-Round SHACAL-1. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Mihir Bellare, Tadayoshi Kohno A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, Ramesh Govindan COSSACK: Coordinated Suppression of Simultaneous Attacks. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Benny Pinkas, Tomas Sander Securing passwords against dictionary attacks. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky Analysing Approximate Confinement under Uniform Attacks. Search on Bibsonomy SAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Kristopher Daley, Ryan Larson, Jerald Dawkins A Structural Framework for Modeling Multi-Stage Network Attacks. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Andrei Serjantov, Roger Dingledine, Paul F. Syverson From a Trickle to a Flood: Active Attacks on Several Mix Types. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Elena Trichina, Antonio Bellezza Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Vlastimil Klíma, Tomás Rosa Further Results and Considerations on Side Channel Attacks on RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Chris Pavlovski, Colin Boyd Attacks Based on Small Factors in Various Group Structures. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Karl Brincat, Chris J. Mitchell New CBC-MAC Forgery Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption
19Werner Schindler, François Koeune, Jean-Jacques Quisquater Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Error detection, error correction, timing attack, power attack
19Eric Y. Chen AEGIS: An Active-Network-Powered Defense Mechanism against DDoS Attacks. Search on Bibsonomy IWAN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Adam Back, Ulf Möller, Anton Stiglic Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Mike Bond Attacks on Cryptoprocessor Transaction Sets. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Baoqing Ye Defeating Denial-of-Service Attacks on the Internet. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Anne Canteaut, Michaël Trabbia Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19M. Anwarul Hasan Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Yuji Watanabe, Hideki Imai Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Serge Vaudenay Resistance Against General Iterated Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Adam L. Young, Moti Yung The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log
19Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker 0001, Peter Landrock, Caroline Shafer Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
19Scott A. Crosby, Dan S. Wallach, Rudolf H. Riedi Opportunities and Limits of Remote Timing Attacks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF jitter, timing attacks, Information leakage
19Yalin Evren Sagduyu, Anthony Ephremides A game-theoretic analysis of denial of service attacks in wireless random access. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks
Displaying result #601 - #700 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license