The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede Perfect Matching Disclosure Attacks. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Yi-Chong Zeng, Soo-Chang Pei Automatic video diagnosing method using embedded crypto-watermarks. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Robson de Oliveira Albuquerque, Luis Javier García-Villalba, Rafael Timóteo de Sousa Júnior Enhancing an Integer Challenge-Response Protocol. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spontaneous Self-Organized Networks, Peer Identification, Identification Protocol, Trust, Information Security
19Yossef Oren, Adi Shamir Remote Password Extraction from RFID Tags. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sidechannel attacks, RFID, cryptanalysis, power analysis
19C.-S. Lu, C.-Y. Hsu Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Guanglei Liu, Chuanyi Ji Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay Non-intrusive IP traceback for DDoS attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed denial of service attacks, IP traceback
19Alexey Smirnov 0001, Tzi-cker Chiueh Automatic Patch Generation for Buffer Overflow Attacks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Feng Cheng 0002, Christian Wolter, Christoph Meinel A Simple, Smart and Extensible Framework for Network Security Measurement. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
19Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato Tracing back attacks against encrypted protocols. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, intrusion detection system (IDS), traceback
19Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Hongjian Li, Ming Xu 0002, Yi Li Selfish MAC Layer Misbehavior Detection Model for the IEEE 802.11-Based Wireless Mesh Networks. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF double-mode detection model, IEEE 802.11, Wireless Mesh Networks, selfish behavior
19Zhitang Li, Aifang Zhang, Jie Lei 0004, Li Wang 0015 Real-Time Correlation of Network Security Alerts. Search on Bibsonomy ICEBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Chen Yang, Wenping Ma 0002, Xinmei Wang Novel Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Onur Aciiçmez, Jean-Pierre Seifert Cheap Hardware Parallelism Implies Cheap Security. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Wentao Zhang, Wenling Wu, Dengguo Feng New Results on Impossible Differential Cryptanalysis of Reduced AES. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, impossible differentials
19Qiong Huang 0001, Duncan S. Wong Generic Certificateless Encryption in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yasuaki Sakamoto, Jeffrey V. Nickerson Social Behavior in a Team of Autonomous Sensors. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song Sweeper: a lightweight end-to-end system for defending against fast worms. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF VSEF, flash worm, dynamic instrumentation, antibody
19Eyüp Serdar Ayaz, Ali Aydin Selçuk Improved DST Cryptanalysis of IDEA. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MANET Routing, Byzantine Attacks, Security
19Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Ermaliza Razali, Raphael C.-W. Phan On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Chia-Mei Chen, Bingchiang Jeng, Chia Ru Yang, Gu Hsin Lai Tracing Denial of Service Origin: Ant Colony Approach. Search on Bibsonomy EvoWorkshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Yaniv Shaked, Avishai Wool Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream cipher, Bluetooth, BDD
19Damian Watkins, Craig Scott, Darryn Randle A Graph Alorithm Based Approach to Recovery and Failover in Tactical Manets. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clique Set Algorithm, Cut Set Algorithm, Mobile Adhoc Networks, Graph Theory, Network Security, Intelligent Agents
19Antoine Joux, Pascal Delaunay Galois LFSR, Embedded Devices and Side Channel Weaknesses. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Hyung-Woo Lee SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata DoS Packet Filter Using DNS Information. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei Tracing the Event Evolution of Terror Attacks from On-Line News. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security informatics, event evolution, topic detection and tracking
19Zili Shao, Qingfeng Zhuge, Chun Xue, Edwin Hsing-Mean Sha Efficient Assignment and Scheduling for Heterogeneous DSP Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network-level security and protection
19Shigang Chen, Qingguo Song Perimeter-Based Defense against High Bandwidth DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network-level security and protection
19Xiapu Luo, Rocky K. C. Chang Optimizing the Pulsing Denial-of-Service Attacks. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Frédéric Muller, Thomas Peyrin Linear Cryptanalysis of the TSC Family of Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Suphithat Songsiri A New Approach for Computation Result Protection in the Mobile Agent Paradigm. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Giorgio Giacinto, Roberto Perdisci, Fabio Roli Network Intrusion Detection by Combining One-Class Classifiers. Search on Bibsonomy ICIAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Pattern Recognition, Computer Security
19Sufatrio, Roland H. C. Yap Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine Privacy Vulnerabilities in Encrypted HTTP Streams. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Souradyuti Paul, Bart Preneel Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Minsoo Kim 0002, Jae-Hyun Seo, Seungyong Lee 0001, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang 0001 Worm Origin Identification Using Random Moonwalks. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Shai Rubin, Somesh Jha, Barton P. Miller Language-Based Generation and Evaluation of NIDS Signatures. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Yang Xiang 0001, Wanlei Zhou 0001 Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Wei-Chi Ku, Maw-Jinn Tsaur A Remote User Authentication Scheme Using Strong Graphical Passwords. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Abdulrahman Alharby, Hideki Imai Hybrid Intrusion Detection Model Based on Ordered Sequences. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF continuous pattern, discontinuous pattern, data mining, intrusion detection
19Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu Techniques and tools for analyzing intrusion alerts. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intrusion detection, security management, alert correlation
19Ya-Fen Chang, Chin-Chen Chang 0001, Jui-Yi Kuo A secure one-time password authentication scheme using smart cards without limiting login times. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, smart card, one-time password
19Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
19Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee TTS without Revocation Capability Secure Against CCA2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn Location-aware key management scheme for wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
19Hyogon Kim, Jin-Ho Kim, Saewoong Bahk, Inhye Kang Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Jongwoon Park, Gunhee Lee, Sangha Lee, Dong-Kyoo Kim RPS: An Extension of Reference Monitor to Prevent Race-Attacks. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld DoS protection for UDP-based protocols. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE
19Peter James Leadbitter, Nigel P. Smart Analysis of the Insecurity of ECMQV with Partially Known Nonces. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Eli Biham, Orr Dunkelman, Nathan Keller Differential-Linear Cryptanalysis of Serpent. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Steven Cheung, Ulf Lindqvist, Martin W. Fong Modeling Multistep Cyber Attacks for Scenario Recognition. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Michael Backes 0001, Matthias Schunter From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal methods, cryptography
19Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Igor V. Kotenko, Evgeny Man'kov Experiments with Simulation of Attacks against Computer Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat An FPGA Implementation of the Linear Cryptanalysis. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Angelos D. Keromytis, Vishal Misra, Dan Rubenstein SOS: secure overlay services. Search on Bibsonomy SIGCOMM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network security, overlay networks, denial of service attacks
19Kristopher Daley, Ryan Larson, Jerald Dawkins A Structural Framework for Modeling Multi-Stage Network Attacks. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Vlastimil Klíma, Tomás Rosa Further Results and Considerations on Side Channel Attacks on RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Markus Jakobsson, Susanne Wetzel Security Weaknesses in Bluetooth. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Marc Joye, Jean-Jacques Quisquater, Moti Yung On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Frédéric Cuppens, Rodolphe Ortalo LAMBDA: A Language to Model a Database for Detection of Attacks. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier New Attacks on PKCS#1 v1.5 Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko Interpolation Attacks of the Block Cipher: SNAKE. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Jeffrey Horton, Jennifer Seberry Companion Viruses and the Macintosh: Threats and Countermeasures. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Jean-Sébastien Coron, David Naccache, Julien P. Stern On the Security of RSA Padding. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Michael J. Wiener, Robert J. Zuccherato Faster Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Wai W. Fung, James W. Gray III Protection Against EEPROM Modification Attacks. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
19Han Wu 0005, Xiaoyun Wang, Guangwu Xu Reducing an LWE Instance by Modular Hints and its Applications to Primal Attack, Dual Attack and BKW Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
19Jaeil Lee, Yongjoon Lee, Donghwan Lee, Hyukjin Kwon, Dongkyoo Shin Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Chengshang Hou, Junzheng Shi, Mingxin Cui, Qingya Yang Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack. Search on Bibsonomy TrustCom The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Dov M. Gabbay, Artur S. d'Avila Garcez Logical Modes of Attack in Argumentation Networks. Search on Bibsonomy Stud Logica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF modes of attack, defeasible consequence, argumentation
19Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li DDoS Attack Detection Algorithm Using IP Address Features. Search on Bibsonomy FAW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IP address features value, support vector machine, network security, distributed denial of service attack
19Yoshinori Aono A New Lattice Construction for Partial Key Exposure Attack for RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction
19Mathias Herrmann, Gregor Leander A Practical Key Recovery Attack on Basic TCHo. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCHo, stream cipher, chosen ciphertext attack
19Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta Fault Analysis Attack against an AES Prototype Chip Using RSL. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Switching Logic, Clock-based Attack, AES, Fault Analysis
19Taejoon Park, Kang G. Shin Attack-tolerant localization via iterative verification of locations in sensor networks. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-tolerance, sensor networks, localization, Anomaly detection, recursive least squares
19Shouhuai Xu, Xiaohu Li, T. Paul Parker Exploiting social networks for threshold signing: attack-resilience vs. availability. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-resilience, threshold signing, social networks, availability, threshold cryptography
19Sun Choi, Doo-young Kim, Do Hyeon Lee, Jae-Il Jung WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wormhole tunnel, ad hoc networks, wormhole attack, route discovery, qualnet
19Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey Determining a parallel session attack on a key distribution protocol using a model checker. Search on Bibsonomy MoMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attacks on security protocols, formal analysis of security protocols, parallel session attack, model checking
19Navneet Kumar Pandey, S. K. Gupta 0001, Shaveta Leekha Algebra for Capability Based Attack Correlation. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF capability model, intrusion detection, attack scenario
19Kenneth Bryan, Michael P. O'Mahony, Padraig Cunningham Unsupervised retrieval of attack profiles in collaborative recommender systems. Search on Bibsonomy RecSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF recommender system, attack detection, shilling
19Jörn-Marc Schmidt, Chong Hee Kim A Probing Attack on AES. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Probing Attack, Smart Card, AES
19HongQian Karen Lu Attack Detection for Resource-Constrained Network Devices. Search on Bibsonomy ICONS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedded systems, attack detection, Security token
19Wei Du, Mingxing He Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Key distribution, self-healing, WSNs, collusion attack
19Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision
19Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF node capture attack detection, node revocation, efficiency, resilience, distributed protocol, wireless sensor network security
19Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, L. Darrell Whitley Optimal security hardening using multi-objective optimization on attack tree models of networks. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-objective optimization, security management, attack trees
19Nayot Poolsapassit, Indrajit Ray Investigating Computer Attacks Using Attack Trees. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensic investigation, computer attacks, log file filtering, attack tree
19Kai Wang 0002, Guillaume Lavoué, Florence Denis, Atilla Baskurt Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, robustness, digital watermarking, attack, copyright protection, 3D mesh
19Duo Lei, Chao Li, Keqin Feng Square Like Attack on Camellia. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Square attack, Block Cipher, Camellia
19Dan Page, Frederik Vercauteren A Fault Attack on Pairing-Based Cryptography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, identity based encryption, fault attack, Tate pairing
Displaying result #701 - #800 of 25080 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license