The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Guangzhi Qu, Salim Hariri, Mazin S. Yousif A New Dependency and Correlation Analysis for Features. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF correlation measure, Feature extraction
17Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Histographs. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix
17Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ulf Larson, Emilie Lundin Barse, Erland Jonsson METAL - A Tool for Extracting Attack Manifestations. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Automated attack analysis, log data, intrusion detection, system calls
17Manhee Lee, Mazin S. Yousif Instant attack stopper in InfiniBand architecture. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ruijun Yang, Qunhua Pan, Weinong Wang, Minglu Li 0001 Secure Enhancement Scheme for Routing Protocol in Mobile Ad Hoc Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Chuanhuan Yin, Shengfeng Tian, Shaomin Mu Using Gap-Insensitive String Kernel to Detect Masquerading. Search on Bibsonomy ADMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Palak K. Amin, Koduvayur P. Subbalakshmi Rotation and cropping resilient data hiding with zernike moments. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 A Formalization of Off-Line Guessing for Security Protocol Analysis. Search on Bibsonomy LPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Lap-Chung Lam, Tzi-cker Chiueh Automatic Extraction of Accurate Application-Specific Sandboxing Policy. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack
17Xinyu Yang, Yong Liu, Ming Zeng, Yi Shi A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. Search on Bibsonomy AWCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Khin Mi Mi Aung, Jong Sou Park Software Rejuvenation Approach to Security Engineering. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Aishwarya Iyer, Lorie M. Liebrock Vulnerability Scanning for Buffer Overflow. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone Validation of Elliptic Curve Public Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee 0002 Differential Cryptanalysis of TEA and XTEA. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis
17Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred Statistical Approaches to DDoS Attack Detection and Response. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Danilo Bruschi, Emilia Rosti AngeL: a tool to disarm computer systems. Search on Bibsonomy NSPW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF computer and network security, disarm, offense, Internet, monitor, attack, defense
17John A. Trono Comments on "Tagged Semaphores". Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Serge Vaudenay Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Jiawen Su, Daniel W. Manchala Trust vs. Threats: Recovery and Survival in Electronic Commerce. Search on Bibsonomy ICDCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Trust protocols, EC Threats, Trust, Anonymity, Electronic Commerce
17Phong Q. Nguyen, Jacques Stern The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Donald Beaver Equivocable Oblivious Transfer. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
17Menghao Zhang, Guanyu Li, Lei Xu 0024, Jun Bi, Guofei Gu, Jiasong Bai Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. Search on Bibsonomy RAID The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Shigeo Akashi, Yao Tong On the Distributed DoS Attacks Targeting at the Bottlenecked Links: More Threatening DoS Attacks than Server Targeting DoS Attacks. Search on Bibsonomy CNIOT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford How secure are secure interdomain routing protocols. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF as-level topology, traffic attraction attacks, security, simulations, BGP
17Jun Wu, Yong-Bin Kim, Minsu Choi Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic
17Shiva Prasad Kasiviswanathan, Mark Rudelson, Adam D. Smith, Jonathan R. Ullman The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. Search on Bibsonomy STOC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF reconstruction attacks, data privacy, differential privacy, random matrices
17Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
17Vasily Desnitsky, Igor V. Kotenko Design of Entrusting Protocols for Software Protection. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection
17Soo Young Moon, Tae Ho Cho Energy efficient filtering method in sensor networks. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SEF, false report injection, wireless sensor networks, security attacks
17Jean-Sébastien Coron, Ilya Kizhvatov An Efficient Method for Random Delay Generation in Embedded Software. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random delays, Side channel attacks, countermeasures
17Matthias Baumgart 0001, Christian Scheideler, Stefan Schmid 0001 A DoS-resilient information system for dynamic data management. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF replication, peer-to-peer systems, DHTS, denial of service attacks
17Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web security, malicious software, distributed attacks
17Christie I. Ezeife, Maxwell Ejelike, Akshai K. Aggarwal WIDS: a sensor-based online mining wireless intrusion detection system. Search on Bibsonomy IDEAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CommView for WIFI, hardware sensor, wireless attacks, wireless intrusion detection, clustering
17Hae Young Lee, Tae Ho Cho A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF false data injection attacks, false data filtering, security, Wireless sensor networks, fuzzy logic
17Somitra Kumar Sanadhya, Palash Sarkar 0001 Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 family, reduced round attacks, cryptanalysis
17Frédéric Amiel, Benoit Feix On the BRIP Algorithms Security for RSA. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks
17Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera MAISim: mobile agent malware simulator. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings
17Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
17Régis Leveugle Early Analysis of Fault-based Attack Effects in Secure Circuits. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RTL dependability evaluation, security validation, fault models, fault injection, fault attacks
17Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF robust hardware, back-end design automation, power-constant architectures, DFY, side-channel attacks, DFM, mitigation
17Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly Analyzing the vulnerability of superpeer networks against attack. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF complex network theory, superpeer networks, attacks
17Krutartha Patel, Sridevan Parameswaran, Seng Lin Shee Ensuring secure program execution in multiprocessor embedded systems: a case study. Search on Bibsonomy CODES+ISSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded system processors, tensilica, security, multiprocessors, code injection attacks
17Guilhem Castagnos, Damien Vergnaud Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Polynomial Diffie-Hellman Problems, Standard Model, Public Key Encryption, Random Oracle Model, Semantic Security, Chosen-Ciphertext Attacks
17Baruch Awerbuch, Christian Scheideler A denial-of-service resistant DHT. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed information systems, denial-of-service attacks
17George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
17Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini Methodologies and frameworks for testing ids in adhoc networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole
17K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao Solving Discrete Logarithms from Partial Knowledge of the Key. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Generic Groups, Side Channel Attacks, Discrete Logarithm Problem
17Hae Young Lee, Tae Ho Cho Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF false data injection attacks, commutative cipher, Wireless sensor networks, fuzzy logic, en-route filtering
17Ermaliza Razali, Raphael C.-W. Phan, Marc Joye On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security
17Ta-Te Lu, Wei-Lun Hsu, Pao-Chi Chang A Low Complexity Recovery Temporal Synchronization Signals Based on Local Variance Statistics. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Temporal attacks, temporal distortions, synchronization
17Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai Denial-of-Service Attack-Detection Techniques. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF denial-of-service, DoS, flooding attacks
17Van-Ly Le Polly Two : A New Algebraic Polynomial-based Public-Key Scheme. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Combinatorially algebraic public-key cryptoschemes, Polly Cracker, EnRoot, Linear-Algebra attacks, System of algebraic equations, Elimination ideals, Sparse polynomials
17Yannick Monnet, Marc Renaudin, Régis Leveugle Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF quasi-delay insensitive, hardening techniques, Asynchronous circuits, data encryption standard, fault attacks
17Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF location-aware protocols, exclusion basis systems, Wireless sensor networks, combinatorial optimization, key management, secure group communications, collusion attacks, energy efficient design
17Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold Secure Internet Banking Authentication. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates
17Enock Chisonge Mofya, J. Cole Smith Exact and heuristic algorithms for solving the generalized minimum filter placement problem. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Heuristics, Mixed-integer programming, Facets, Computer network security, Denial of service attacks
17Jie Xu 0007, Erica Y. Yang, Keith H. Bennett A Practical Approach to Secure Web Services. Search on Bibsonomy ISORC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack tolerance, malicious attacks, Web services, privacy protection, distributed information retrieval
17Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis Puppetnets: misusing web browsers as a distributed attack infrastructure. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF web security, malicious software, distributed attacks
17Frederik Armknecht, Matthias Krause 0001 Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF matroid union algorithm, boolean functions, algebraic attacks, Cryptographic primitives
17Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam Effect of Malicious Synchronization. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity
17Elias Athanasopoulos, Spyros Antonatos Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Laundry attacks, Web Security, CAPTCHA
17Min-Su Kim, Jae-Won Cho, Rémy Prost, Ho-Youl Jung Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF scaling coefficients, topological attacks, wavelet transform, Watermarking, blind detection
17Johannes Blömer, Martin Otto 0002 Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CRT-RSA, BOS-Scheme, Wagner’s attack, smartcards, fault attacks
17Eun-Jun Yoon, Kee-Young Yoo One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks
17Zhimin Chen, Yujie Zhou Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA
17Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA
17Min Cai, Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Yu Chen 0002 Collaborative Internet Worm Containment. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, anomaly detection, distributed hash tables, DHT, overlay networks, distributed denial-of-service, DDoS attacks, Internet worms, signature generation
17Ying Qiu, Jianying Zhou 0001, Robert H. Deng Security Analysis and Improvement of Return Routability Protocol. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Redirect Attacks, Security, Authentication, MIPv6
17Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
17David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan Experimenting with Faults, Lattices and the DSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF glitch attacks, fault injection, lattice reduction, DSA
17Joel Coburn, Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar SECA: security-enhanced communication architecture. Search on Bibsonomy CASES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF AMBA Bus, security-aware design, small embedded systems, security, communication, access control, architecture, intrusion detection, system-on-chip (SoC), attacks, bus, digital rights management (DRM)
17Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu Finding Collisions in the Full SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision search attacks, Hash functions, SHA-1, SHA-0
17Wieland Fischer, Berndt M. Gammel Masking at Gate Level in the Presence of Glitches. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches
17Henry S. Baird, Michael A. Moll, Sui-Yu Wang ScatterType: A Legible but Hard-to-Segment CAPTCHA. Search on Bibsonomy ICDAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF abuse of web sites and services, human/machine discrimination, legibility of text, Gestalt perception, automatic attacks on CAPTCHAs, segmentation, fragmentation, document image analysis, CAPTCHAs, Turing tests, human interactive proofs
17Andreas Pashalidis, Chris J. Mitchell Limits to Anonymity When Using Credentials. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pseudonym systems, privacy, timing attacks, unlinkability, anonymous credential systems
17Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
17Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
17Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design
17Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
17Olivier Billet, Marc Joye The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis
17Markku-Juhani Olavi Saarinen Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks
17Jovan Dj. Golic DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures
17Patrik Ekdahl, Thomas Johansson 0001 A New Version of the Stream Cipher SNOW. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF summation combiner, Stream ciphers, correlation attacks, SNOW
17Gitae Kim, Tony J. Bogovic, Dana Chee ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring
17Jovan Dj. Golic Correlation Analysis of the Shrinking Generator. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF unconstrained irregular clocking, Stream ciphers, fast correlation attacks, posterior probabilities
17Eric Brier, Helena Handschuh, Christophe Tymen Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance
17Alex Biryukov, Adi Shamir Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time/memory tradeoff attacks, Cryptanalysis, stream ciphers
17Thomas E. Daniels, Eugene H. Spafford A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF network audit system, NASHID, operating system audit trails, low-level network attacks, application sources, network protocol stack, audit data, audit data accumulation, Linux, Unix, security of data, auditing, network operating systems, computer network management, system calls, host-based intrusion detection
17Shai Halevi, Hugo Krawczyk Public-Key Cryptography and Password Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks
17Fabien A. P. Petitcolas, Ross J. Anderson Evaluation of Copyright Marking Systems. Search on Bibsonomy ICMCS, Vol. 1 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF benchmark, Digital watermarking, attacks
17David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks
17John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall Side Channel Cryptanalysis of Product Ciphers. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF product ciphers, cryptanalysis, timing attacks, side channels
17Jiri Fridrich, Arnold C. Baldoza, Richard J. Simard Robust Digital Watermarking Based on Key-Dependent Basis Functions. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Robust image watermarking, orthogonal patterns, secure public watermark detector, attacks
17Erland Jonsson, Tomas Olovsson A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF operational security, modeling, metric, Computer security, attacks, intrusion
17Jovan Dj. Golic, Renato Menicocci Edit Distance Correlation Attack on the Alternating Step Generator. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF clock-controlled shift registers, alternating step generator, cryptanalysis, Stream ciphers, edit distance, correlation attacks
16Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh Protecting browsers from DNS rebinding attacks. Search on Bibsonomy ACM Trans. Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spam, firewall, DNS, Same-origin policy, click fraud
16Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Axel Poschmann, Johann Großschädl, Frank K. Gürkaynak, Marco Macchetti, Zeynep Toprak Deniz, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Xin-Wei Li, Bao-Long Guo, Lei-Da Li, Hong-Xin Shen A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license