|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11110 occurrences of 2965 keywords
|
|
|
Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Guangzhi Qu, Salim Hariri, Mazin S. Yousif |
A New Dependency and Correlation Analysis for Features. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
correlation measure, Feature extraction |
17 | Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 |
IDGraphs: Intrusion Detection and Analysis Using Histographs. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix |
17 | Yevgeniy Dodis, Jonathan Katz |
Chosen-Ciphertext Security of Multiple Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ulf Larson, Emilie Lundin Barse, Erland Jonsson |
METAL - A Tool for Extracting Attack Manifestations. |
DIMVA |
2005 |
DBLP DOI BibTeX RDF |
Automated attack analysis, log data, intrusion detection, system calls |
17 | Manhee Lee, Mazin S. Yousif |
Instant attack stopper in InfiniBand architecture. |
CCGRID |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ruijun Yang, Qunhua Pan, Weinong Wang, Minglu Li 0001 |
Secure Enhancement Scheme for Routing Protocol in Mobile Ad Hoc Networks. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Chuanhuan Yin, Shengfeng Tian, Shaomin Mu |
Using Gap-Insensitive String Kernel to Detect Masquerading. |
ADMA |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Palak K. Amin, Koduvayur P. Subbalakshmi |
Rotation and cropping resilient data hiding with zernike moments. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001 |
A Formalization of Off-Line Guessing for Security Protocol Analysis. |
LPAR |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Lap-Chung Lam, Tzi-cker Chiueh |
Automatic Extraction of Accurate Application-Specific Sandboxing Policy. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack |
17 | Xinyu Yang, Yong Liu, Ming Zeng, Yi Shi |
A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Khin Mi Mi Aung, Jong Sou Park |
Software Rejuvenation Approach to Security Engineering. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Aishwarya Iyer, Lorie M. Liebrock |
Vulnerability Scanning for Buffer Overflow. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone |
Validation of Elliptic Curve Public Keys. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee 0002 |
Differential Cryptanalysis of TEA and XTEA. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis |
17 | Jacques Patarin |
Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, Darrell Kindred |
Statistical Approaches to DDoS Attack Detection and Response. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Danilo Bruschi, Emilia Rosti |
AngeL: a tool to disarm computer systems. |
NSPW |
2001 |
DBLP DOI BibTeX RDF |
computer and network security, disarm, offense, Internet, monitor, attack, defense |
17 | John A. Trono |
Comments on "Tagged Semaphores". |
ACM SIGOPS Oper. Syst. Rev. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Serge Vaudenay |
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Jiawen Su, Daniel W. Manchala |
Trust vs. Threats: Recovery and Survival in Electronic Commerce. |
ICDCS |
1999 |
DBLP DOI BibTeX RDF |
Trust protocols, EC Threats, Trust, Anonymity, Electronic Commerce |
17 | Phong Q. Nguyen, Jacques Stern |
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Donald Beaver |
Equivocable Oblivious Transfer. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
17 | Menghao Zhang, Guanyu Li, Lei Xu 0024, Jun Bi, Guofei Gu, Jiasong Bai |
Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. |
RAID |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Shigeo Akashi, Yao Tong |
On the Distributed DoS Attacks Targeting at the Bottlenecked Links: More Threatening DoS Attacks than Server Targeting DoS Attacks. |
CNIOT |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Sharon Goldberg, Michael Schapira, Peter Hummon, Jennifer Rexford |
How secure are secure interdomain routing protocols. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
as-level topology, traffic attraction attacks, security, simulations, BGP |
17 | Jun Wu, Yong-Bin Kim, Minsu Choi |
Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic |
17 | Shiva Prasad Kasiviswanathan, Mark Rudelson, Adam D. Smith, Jonathan R. Ullman |
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. |
STOC |
2010 |
DBLP DOI BibTeX RDF |
reconstruction attacks, data privacy, differential privacy, random matrices |
17 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Elastic block ciphers: method, security and instantiations. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks |
17 | Vasily Desnitsky, Igor V. Kotenko |
Design of Entrusting Protocols for Software Protection. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Security protocol design, Remote entrusting, Protocol analysis and verification, Attacks, Software protection |
17 | Soo Young Moon, Tae Ho Cho |
Energy efficient filtering method in sensor networks. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
SEF, false report injection, wireless sensor networks, security attacks |
17 | Jean-Sébastien Coron, Ilya Kizhvatov |
An Efficient Method for Random Delay Generation in Embedded Software. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
random delays, Side channel attacks, countermeasures |
17 | Matthias Baumgart 0001, Christian Scheideler, Stefan Schmid 0001 |
A DoS-resilient information system for dynamic data management. |
SPAA |
2009 |
DBLP DOI BibTeX RDF |
replication, peer-to-peer systems, DHTS, denial of service attacks |
17 | Spyros Antonatos, Periklis Akritidis, Vinh The Lam, Kostas G. Anagnostakis |
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Web security, malicious software, distributed attacks |
17 | Christie I. Ezeife, Maxwell Ejelike, Akshai K. Aggarwal |
WIDS: a sensor-based online mining wireless intrusion detection system. |
IDEAS |
2008 |
DBLP DOI BibTeX RDF |
CommView for WIFI, hardware sensor, wireless attacks, wireless intrusion detection, clustering |
17 | Hae Young Lee, Tae Ho Cho |
A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
false data injection attacks, false data filtering, security, Wireless sensor networks, fuzzy logic |
17 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
17 | Frédéric Amiel, Benoit Feix |
On the BRIP Algorithms Security for RSA. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks |
17 | Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera |
MAISim: mobile agent malware simulator. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings |
17 | Pascal Delaunay, Antoine Joux |
Yet Another Attack on Vest. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform |
17 | Régis Leveugle |
Early Analysis of Fault-based Attack Effects in Secure Circuits. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
RTL dependability evaluation, security validation, fault models, fault injection, fault attacks |
17 | Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu |
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
robust hardware, back-end design automation, power-constant architectures, DFY, side-channel attacks, DFM, mitigation |
17 | Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy Ganguly |
Analyzing the vulnerability of superpeer networks against attack. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
complex network theory, superpeer networks, attacks |
17 | Krutartha Patel, Sridevan Parameswaran, Seng Lin Shee |
Ensuring secure program execution in multiprocessor embedded systems: a case study. |
CODES+ISSS |
2007 |
DBLP DOI BibTeX RDF |
embedded system processors, tensilica, security, multiprocessors, code injection attacks |
17 | Guilhem Castagnos, Damien Vergnaud |
Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Polynomial Diffie-Hellman Problems, Standard Model, Public Key Encryption, Random Oracle Model, Semantic Security, Chosen-Ciphertext Attacks |
17 | Baruch Awerbuch, Christian Scheideler |
A denial-of-service resistant DHT. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
distributed information systems, denial-of-service attacks |
17 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). |
PM2HW2N |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
17 | Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini |
Methodologies and frameworks for testing ids in adhoc networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole |
17 | K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao |
Solving Discrete Logarithms from Partial Knowledge of the Key. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Generic Groups, Side Channel Attacks, Discrete Logarithm Problem |
17 | Hae Young Lee, Tae Ho Cho |
Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
false data injection attacks, commutative cipher, Wireless sensor networks, fuzzy logic, en-route filtering |
17 | Ermaliza Razali, Raphael C.-W. Phan, Marc Joye |
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security |
17 | Ta-Te Lu, Wei-Lun Hsu, Pao-Chi Chang |
A Low Complexity Recovery Temporal Synchronization Signals Based on Local Variance Statistics. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
Temporal attacks, temporal distortions, synchronization |
17 | Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai |
Denial-of-Service Attack-Detection Techniques. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
denial-of-service, DoS, flooding attacks |
17 | Van-Ly Le |
Polly Two : A New Algebraic Polynomial-based Public-Key Scheme. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Combinatorially algebraic public-key cryptoschemes, Polly Cracker, EnRoot, Linear-Algebra attacks, System of algebraic equations, Elimination ideals, Sparse polynomials |
17 | Yannick Monnet, Marc Renaudin, Régis Leveugle |
Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
quasi-delay insensitive, hardening techniques, Asynchronous circuits, data encryption standard, fault attacks |
17 | Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy |
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
location-aware protocols, exclusion basis systems, Wireless sensor networks, combinatorial optimization, key management, secure group communications, collusion attacks, energy efficient design |
17 | Alain P. Hiltgen, Thorsten Kramp, Thomas Weigold |
Secure Internet Banking Authentication. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
short-time passwords, short-lived passwords, taxonomy of attacks, authentication, Internet banking, public-key certificates |
17 | Enock Chisonge Mofya, J. Cole Smith |
Exact and heuristic algorithms for solving the generalized minimum filter placement problem. |
J. Comb. Optim. |
2006 |
DBLP DOI BibTeX RDF |
Heuristics, Mixed-integer programming, Facets, Computer network security, Denial of service attacks |
17 | Jie Xu 0007, Erica Y. Yang, Keith H. Bennett |
A Practical Approach to Secure Web Services. |
ISORC |
2006 |
DBLP DOI BibTeX RDF |
Attack tolerance, malicious attacks, Web services, privacy protection, distributed information retrieval |
17 | Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis |
Puppetnets: misusing web browsers as a distributed attack infrastructure. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
web security, malicious software, distributed attacks |
17 | Frederik Armknecht, Matthias Krause 0001 |
Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
matroid union algorithm, boolean functions, algebraic attacks, Cryptographic primitives |
17 | Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam |
Effect of Malicious Synchronization. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity |
17 | Elias Athanasopoulos, Spyros Antonatos |
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
Laundry attacks, Web Security, CAPTCHA |
17 | Min-Su Kim, Jae-Won Cho, Rémy Prost, Ho-Youl Jung |
Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
scaling coefficients, topological attacks, wavelet transform, Watermarking, blind detection |
17 | Johannes Blömer, Martin Otto 0002 |
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
CRT-RSA, BOS-Scheme, Wagner’s attack, smartcards, fault attacks |
17 | Eun-Jun Yoon, Kee-Young Yoo |
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Smart card, User authentication, One-time password, Denial-of-Service attacks |
17 | Zhimin Chen, Yujie Zhou |
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA |
17 | Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh |
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA |
17 | Min Cai, Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Yu Chen 0002 |
Collaborative Internet Worm Containment. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
network security, anomaly detection, distributed hash tables, DHT, overlay networks, distributed denial-of-service, DDoS attacks, Internet worms, signature generation |
17 | Ying Qiu, Jianying Zhou 0001, Robert H. Deng |
Security Analysis and Improvement of Return Routability Protocol. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
Redirect Attacks, Security, Authentication, MIPv6 |
17 | Sanjeev Kumar |
Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
ARP attack, Distributed Denial of Service Attacks, Computer Network Security |
17 | David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan |
Experimenting with Faults, Lattices and the DSA. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
glitch attacks, fault injection, lattice reduction, DSA |
17 | Joel Coburn, Srivaths Ravi 0001, Anand Raghunathan, Srimat T. Chakradhar |
SECA: security-enhanced communication architecture. |
CASES |
2005 |
DBLP DOI BibTeX RDF |
AMBA Bus, security-aware design, small embedded systems, security, communication, access control, architecture, intrusion detection, system-on-chip (SoC), attacks, bus, digital rights management (DRM) |
17 | Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu |
Finding Collisions in the Full SHA-1. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
collision search attacks, Hash functions, SHA-1, SHA-0 |
17 | Wieland Fischer, Berndt M. Gammel |
Masking at Gate Level in the Presence of Glitches. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches |
17 | Henry S. Baird, Michael A. Moll, Sui-Yu Wang |
ScatterType: A Legible but Hard-to-Segment CAPTCHA. |
ICDAR |
2005 |
DBLP DOI BibTeX RDF |
abuse of web sites and services, human/machine discrimination, legibility of text, Gestalt perception, automatic attacks on CAPTCHAs, segmentation, fragmentation, document image analysis, CAPTCHAs, Turing tests, human interactive proofs |
17 | Andreas Pashalidis, Chris J. Mitchell |
Limits to Anonymity When Using Credentials. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
pseudonym systems, privacy, timing attacks, unlinkability, anonymous credential systems |
17 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
17 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
17 | Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs |
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design |
17 | Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette |
Authenticated On-Line Encryption. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks |
17 | Olivier Billet, Marc Joye |
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. |
AAECC |
2003 |
DBLP DOI BibTeX RDF |
unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis |
17 | Markku-Juhani Olavi Saarinen |
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks |
17 | Jovan Dj. Golic |
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures |
17 | Patrik Ekdahl, Thomas Johansson 0001 |
A New Version of the Stream Cipher SNOW. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
summation combiner, Stream ciphers, correlation attacks, SNOW |
17 | Gitae Kim, Tony J. Bogovic, Dana Chee |
ACtive edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Networks. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
Intruder Identification & Isolation, Distributed Denial of Service (DDoS) Attacks, Active (or Programmable) Networks, Network Security, Traffic Monitoring |
17 | Jovan Dj. Golic |
Correlation Analysis of the Shrinking Generator. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
unconstrained irregular clocking, Stream ciphers, fast correlation attacks, posterior probabilities |
17 | Eric Brier, Helena Handschuh, Christophe Tymen |
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Probing attacks, Data scrambling, Keyed permutations, Smart-cards, Tamper-resistance |
17 | Alex Biryukov, Adi Shamir |
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
time/memory tradeoff attacks, Cryptanalysis, stream ciphers |
17 | Thomas E. Daniels, Eugene H. Spafford |
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
network audit system, NASHID, operating system audit trails, low-level network attacks, application sources, network protocol stack, audit data, audit data accumulation, Linux, Unix, security of data, auditing, network operating systems, computer network management, system calls, host-based intrusion detection |
17 | Shai Halevi, Hugo Krawczyk |
Public-Key Cryptography and Password Protocols. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks |
17 | Fabien A. P. Petitcolas, Ross J. Anderson |
Evaluation of Copyright Marking Systems. |
ICMCS, Vol. 1 |
1999 |
DBLP DOI BibTeX RDF |
benchmark, Digital watermarking, attacks |
17 | David Pointcheval |
New Public Key Cryptosystems Based on the Dependent-RSA Problems. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks |
17 | John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall |
Side Channel Cryptanalysis of Product Ciphers. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
product ciphers, cryptanalysis, timing attacks, side channels |
17 | Jiri Fridrich, Arnold C. Baldoza, Richard J. Simard |
Robust Digital Watermarking Based on Key-Dependent Basis Functions. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
Robust image watermarking, orthogonal patterns, secure public watermark detector, attacks |
17 | Erland Jonsson, Tomas Olovsson |
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
operational security, modeling, metric, Computer security, attacks, intrusion |
17 | Jovan Dj. Golic, Renato Menicocci |
Edit Distance Correlation Attack on the Alternating Step Generator. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
clock-controlled shift registers, alternating step generator, cryptanalysis, Stream ciphers, edit distance, correlation attacks |
16 | Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
Protecting browsers from DNS rebinding attacks. |
ACM Trans. Web |
2009 |
DBLP DOI BibTeX RDF |
spam, firewall, DNS, Same-origin policy, click fraud |
16 | Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Axel Poschmann, Johann Großschädl, Frank K. Gürkaynak, Marco Macchetti, Zeynep Toprak Deniz, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne |
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Xin-Wei Li, Bao-Long Guo, Lei-Da Li, Hong-Xin Shen |
A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
|
|