|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8634 occurrences of 2564 keywords
|
|
|
Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede |
Perfect Matching Disclosure Attacks. |
Privacy Enhancing Technologies |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Yi-Chong Zeng, Soo-Chang Pei |
Automatic video diagnosing method using embedded crypto-watermarks. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Robson de Oliveira Albuquerque, Luis Javier García-Villalba, Rafael Timóteo de Sousa Júnior |
Enhancing an Integer Challenge-Response Protocol. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Spontaneous Self-Organized Networks, Peer Identification, Identification Protocol, Trust, Information Security |
19 | Yossef Oren, Adi Shamir |
Remote Password Extraction from RFID Tags. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
sidechannel attacks, RFID, cryptanalysis, power analysis |
19 | C.-S. Lu, C.-Y. Hsu |
Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding. |
IEEE Trans. Circuits Syst. Video Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Guanglei Liu, Chuanyi Ji |
Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay |
Non-intrusive IP traceback for DDoS attacks. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
distributed denial of service attacks, IP traceback |
19 | Alexey Smirnov 0001, Tzi-cker Chiueh |
Automatic Patch Generation for Buffer Overflow Attacks. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Feng Cheng 0002, Christian Wolter, Christoph Meinel |
A Simple, Smart and Extensible Framework for Network Security Measurement. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. |
FPGA |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
19 | Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato |
Tracing back attacks against encrypted protocols. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
encryption, intrusion detection system (IDS), traceback |
19 | Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 |
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Hongjian Li, Ming Xu 0002, Yi Li |
Selfish MAC Layer Misbehavior Detection Model for the IEEE 802.11-Based Wireless Mesh Networks. |
APPT |
2007 |
DBLP DOI BibTeX RDF |
double-mode detection model, IEEE 802.11, Wireless Mesh Networks, selfish behavior |
19 | Zhitang Li, Aifang Zhang, Jie Lei 0004, Li Wang 0015 |
Real-Time Correlation of Network Security Alerts. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Chen Yang, Wenping Ma 0002, Xinmei Wang |
Novel Remote User Authentication Scheme Using Bilinear Pairings. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Onur Aciiçmez, Jean-Pierre Seifert |
Cheap Hardware Parallelism Implies Cheap Security. |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Wentao Zhang, Wenling Wu, Dengguo Feng |
New Results on Impossible Differential Cryptanalysis of Reduced AES. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, AES, impossible differentials |
19 | Qiong Huang 0001, Duncan S. Wong |
Generic Certificateless Encryption in the Standard Model. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Yasuaki Sakamoto, Jeffrey V. Nickerson |
Social Behavior in a Team of Autonomous Sensors. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song |
Sweeper: a lightweight end-to-end system for defending against fast worms. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
VSEF, flash worm, dynamic instrumentation, antibody |
19 | Eyüp Serdar Ayaz, Ali Aydin Selçuk |
Improved DST Cryptanalysis of IDEA. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens |
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
MANET Routing, Byzantine Attacks, Security |
19 | Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Ermaliza Razali, Raphael C.-W. Phan |
On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Chia-Mei Chen, Bingchiang Jeng, Chia Ru Yang, Gu Hsin Lai |
Tracing Denial of Service Origin: Ant Colony Approach. |
EvoWorkshops |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Yaniv Shaked, Avishai Wool |
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream cipher, Bluetooth, BDD |
19 | Damian Watkins, Craig Scott, Darryn Randle |
A Graph Alorithm Based Approach to Recovery and Failover in Tactical Manets. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
Clique Set Algorithm, Cut Set Algorithm, Mobile Adhoc Networks, Graph Theory, Network Security, Intelligent Agents |
19 | Antoine Joux, Pascal Delaunay |
Galois LFSR, Embedded Devices and Side Channel Weaknesses. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Hyung-Woo Lee |
SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata |
DoS Packet Filter Using DNS Information. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao |
A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei |
Tracing the Event Evolution of Terror Attacks from On-Line News. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
Security informatics, event evolution, topic detection and tracking |
19 | Zili Shao, Qingfeng Zhuge, Chun Xue, Edwin Hsing-Mean Sha |
Efficient Assignment and Scheduling for Heterogeneous DSP Systems. |
IEEE Trans. Parallel Distributed Syst. |
2005 |
DBLP DOI BibTeX RDF |
Network-level security and protection |
19 | Shigang Chen, Qingguo Song |
Perimeter-Based Defense against High Bandwidth DDoS Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2005 |
DBLP DOI BibTeX RDF |
Network-level security and protection |
19 | Xiapu Luo, Rocky K. C. Chang |
Optimizing the Pulsing Denial-of-Service Attacks. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
19 | ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim |
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Frédéric Muller, Thomas Peyrin |
Linear Cryptanalysis of the TSC Family of Stream Ciphers. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Suphithat Songsiri |
A New Approach for Computation Result Protection in the Mobile Agent Paradigm. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Giorgio Giacinto, Roberto Perdisci, Fabio Roli |
Network Intrusion Detection by Combining One-Class Classifiers. |
ICIAP |
2005 |
DBLP DOI BibTeX RDF |
Pattern Recognition, Computer Security |
19 | Sufatrio, Roland H. C. Yap |
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
19 | George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine |
Privacy Vulnerabilities in Encrypted HTTP Streams. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Souradyuti Paul, Bart Preneel |
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Minsoo Kim 0002, Jae-Hyun Seo, Seungyong Lee 0001, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park |
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang 0001 |
Worm Origin Identification Using Random Moonwalks. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Shai Rubin, Somesh Jha, Barton P. Miller |
Language-Based Generation and Evaluation of NIDS Signatures. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Yang Xiang 0001, Wanlei Zhou 0001 |
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Wei-Chi Ku, Maw-Jinn Tsaur |
A Remote User Authentication Scheme Using Strong Graphical Passwords. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Abdulrahman Alharby, Hideki Imai |
Hybrid Intrusion Detection Model Based on Ordered Sequences. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
continuous pattern, discontinuous pattern, data mining, intrusion detection |
19 | Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu |
Techniques and tools for analyzing intrusion alerts. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
Intrusion detection, security management, alert correlation |
19 | Ya-Fen Chang, Chin-Chen Chang 0001, Jui-Yi Kuo |
A secure one-time password authentication scheme using smart cards without limiting login times. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
authentication, smart card, one-time password |
19 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
19 | Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee |
TTS without Revocation Capability Secure Against CCA2. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn |
Location-aware key management scheme for wireless sensor networks. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
19 | Hyogon Kim, Jin-Ho Kim, Saewoong Bahk, Inhye Kang |
Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Jongwoon Park, Gunhee Lee, Sangha Lee, Dong-Kyoo Kim |
RPS: An Extension of Reference Monitor to Prevent Race-Attacks. |
PCM (1) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld |
DoS protection for UDP-based protocols. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE |
19 | Peter James Leadbitter, Nigel P. Smart |
Analysis of the Insecurity of ECMQV with Partially Known Nonces. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Eli Biham, Orr Dunkelman, Nathan Keller |
Differential-Linear Cryptanalysis of Serpent. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Steven Cheung, Ulf Lindqvist, Martin W. Fong |
Modeling Multistep Cyber Attacks for Scenario Recognition. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Michael Backes 0001, Matthias Schunter |
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
formal methods, cryptography |
19 | Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma |
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Igor V. Kotenko, Evgeny Man'kov |
Experiments with Simulation of Attacks against Computer Networks. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
19 | François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat |
An FPGA Implementation of the Linear Cryptanalysis. |
FPL |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
SOS: secure overlay services. |
SIGCOMM |
2002 |
DBLP DOI BibTeX RDF |
network security, overlay networks, denial of service attacks |
19 | Kristopher Daley, Ryan Larson, Jerald Dawkins |
A Structural Framework for Modeling Multi-Stage Network Attacks. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Vlastimil Klíma, Tomás Rosa |
Further Results and Considerations on Side Channel Attacks on RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Markus Jakobsson, Susanne Wetzel |
Security Weaknesses in Bluetooth. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Marc Joye, Jean-Jacques Quisquater, Moti Yung |
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Frédéric Cuppens, Rodolphe Ortalo |
LAMBDA: A Language to Model a Database for Detection of Attacks. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
New Attacks on PKCS#1 v1.5 Encryption. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko |
Interpolation Attacks of the Block Cipher: SNAKE. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Jeffrey Horton, Jennifer Seberry |
Companion Viruses and the Macintosh: Threats and Countermeasures. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Jean-Sébastien Coron, David Naccache, Julien P. Stern |
On the Security of RSA Padding. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Michael J. Wiener, Robert J. Zuccherato |
Faster Attacks on Elliptic Curve Cryptosystems. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Wai W. Fung, James W. Gray III |
Protection Against EEPROM Modification Attacks. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens |
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Han Wu 0005, Xiaoyun Wang, Guangwu Xu |
Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
19 | Jaeil Lee, Yongjoon Lee, Donghwan Lee, Hyukjin Kwon, Dongkyoo Shin |
Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Chengshang Hou, Junzheng Shi, Mingxin Cui, Qingya Yang |
Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack. |
TrustCom |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Dov M. Gabbay, Artur S. d'Avila Garcez |
Logical Modes of Attack in Argumentation Networks. |
Stud Logica |
2009 |
DBLP DOI BibTeX RDF |
modes of attack, defeasible consequence, argumentation |
19 | Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li |
DDoS Attack Detection Algorithm Using IP Address Features. |
FAW |
2009 |
DBLP DOI BibTeX RDF |
IP address features value, support vector machine, network security, distributed denial of service attack |
19 | Yoshinori Aono |
A New Lattice Construction for Partial Key Exposure Attack for RSA. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction |
19 | Mathias Herrmann, Gregor Leander |
A Practical Key Recovery Attack on Basic TCHo. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
TCHo, stream cipher, chosen ciphertext attack |
19 | Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta |
Fault Analysis Attack against an AES Prototype Chip Using RSL. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
Random Switching Logic, Clock-based Attack, AES, Fault Analysis |
19 | Taejoon Park, Kang G. Shin |
Attack-tolerant localization via iterative verification of locations in sensor networks. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
attack-tolerance, sensor networks, localization, Anomaly detection, recursive least squares |
19 | Shouhuai Xu, Xiaohu Li, T. Paul Parker |
Exploiting social networks for threshold signing: attack-resilience vs. availability. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
attack-resilience, threshold signing, social networks, availability, threshold cryptography |
19 | Sun Choi, Doo-young Kim, Do Hyeon Lee, Jae-Il Jung |
WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
wormhole tunnel, ad hoc networks, wormhole attack, route discovery, qualnet |
19 | Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey |
Determining a parallel session attack on a key distribution protocol using a model checker. |
MoMM |
2008 |
DBLP DOI BibTeX RDF |
attacks on security protocols, formal analysis of security protocols, parallel session attack, model checking |
19 | Navneet Kumar Pandey, S. K. Gupta 0001, Shaveta Leekha |
Algebra for Capability Based Attack Correlation. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
capability model, intrusion detection, attack scenario |
19 | Kenneth Bryan, Michael P. O'Mahony, Padraig Cunningham |
Unsupervised retrieval of attack profiles in collaborative recommender systems. |
RecSys |
2008 |
DBLP DOI BibTeX RDF |
recommender system, attack detection, shilling |
19 | Jörn-Marc Schmidt, Chong Hee Kim |
A Probing Attack on AES. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Probing Attack, Smart Card, AES |
19 | HongQian Karen Lu |
Attack Detection for Resource-Constrained Network Devices. |
ICONS |
2008 |
DBLP DOI BibTeX RDF |
embedded systems, attack detection, Security token |
19 | Wei Du, Mingxing He |
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
security, Key distribution, self-healing, WSNs, collusion attack |
19 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision |
19 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei |
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
node capture attack detection, node revocation, efficiency, resilience, distributed protocol, wireless sensor network security |
19 | Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley |
Optimal security hardening using multi-objective optimization on attack tree models of networks. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
multi-objective optimization, security management, attack trees |
19 | Nayot Poolsapassit, Indrajit Ray |
Investigating Computer Attacks Using Attack Trees. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
Forensic investigation, computer attacks, log file filtering, attack tree |
19 | Kai Wang 0002, Guillaume Lavoué, Florence Denis, Atilla Baskurt |
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
authentication, robustness, digital watermarking, attack, copyright protection, 3D mesh |
19 | Duo Lei, Chao Li, Keqin Feng |
Square Like Attack on Camellia. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Square attack, Block Cipher, Camellia |
19 | Dan Page, Frederik Vercauteren |
A Fault Attack on Pairing-Based Cryptography. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, identity based encryption, fault attack, Tate pairing |
|
|