Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Martin Steinebach, Sascha Zmudzinski |
Countermeasure for collusion attacks against digital watermarking. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Longjiang Yu, Xiamu Niu, Sheng-He Sun |
Print-and-scan model and the watermarking countermeasure. |
Image Vis. Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Katsuyuki Okeya, Dong-Guk Han |
Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
15 | James E. Driskell, Brian Mullen |
The Efficacy of Naps as a Fatigue Countermeasure: A Meta-Analytic Integration. |
Hum. Factors |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Ho Won Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
15 | ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim |
An Improved and Efficient Countermeasure against Power Analysis Attacks. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
15 | Craig Valli |
Honeypot technologies and their applicability as an internal countermeasure. |
Australian Computer, Network & Information Forensics Conference |
2005 |
DBLP BibTeX RDF |
|
15 | Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, Michel Robert, Fernando Moraes 0001 |
A new hardware countermeasure for masking power signatures of crypto cores. |
ReCoSoC |
2005 |
DBLP BibTeX RDF |
|
15 | Longjiang Yu, Xiamu Niu, Sheng-He Sun |
SVG-Based Countermeasure to Geometric Attack. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater |
On the Masking Countermeasure and Higher-Order Power Analysis Attacks. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Xinpeng Zhang 0001, Shuozhong Wang |
Invertibility attack against watermarking based on forged algorithm and a countermeasure. |
Pattern Recognit. Lett. |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa |
Random Switching Logic: A Countermeasure against DPA based on Transition Probability. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
15 | You Sung Kang, KyungHee Oh, Byung-Ho Chung, Kyoil Chung, DaeHun Nyang |
Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
802.11i, 802.1X, WPA, WLAN security |
15 | François-Xavier Standaert, Siddika Berna Örs, Bart Preneel |
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim |
Threat Description for Developing Security Countermeasure. |
PCM (1) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Dong-Guk Han, Tetsuya Izu, Jongin Lim 0001, Kouichi Sakurai |
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Dai Kashiwa, Eric Y. Chen, Hitoshi Fuji |
A countermeasure againstDDOS attacks using active networks technologies. |
Ann. des Télécommunications |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Katsuyuki Okeya, Kouichi Sakurai |
A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks. |
ITW |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Katsuyuki Okeya, Tsuyoshi Takagi |
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint |
15 | Andrei Malygin, Miodrag Filip, Enric Vilar |
Neural network implementation of a fade countermeasure controller for a VSAT link. |
Int. J. Satell. Commun. Netw. |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Nedo Celandroni, Francesco Potorti |
Fade countermeasure using signal degradation estimation for demand-assignment satellite systems. |
J. Commun. Networks |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Younsun Kim, Sooyong Choi, Chulwoo You, Daesik Hong |
Effect of carrier frequency offset on the performance of an MC-CDMA system and its countermeasure using pulse shaping. |
ICC |
1999 |
DBLP DOI BibTeX RDF |
|
15 | Ari Juels, John G. Brainard |
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. |
NDSS |
1999 |
DBLP BibTeX RDF |
|
15 | Hisaji Fukuda |
Study of a Consultation System for Railway Safety Countermeasure. |
IEA/AIE |
1996 |
DBLP BibTeX RDF |
|
15 | Amer A. Hassan, John E. Hershey, Jim E. Schroeder 0001 |
On a follower tone-jammer countermeasure technique. |
IEEE Trans. Commun. |
1995 |
DBLP DOI BibTeX RDF |
|
15 | Dieter Kreuer, Ansgar Radermacher, Sven Martin, Thomas Frach |
A prototype adaptive fade countermeasure system for TDMA operation at Ka band. |
PIMRC |
1994 |
DBLP DOI BibTeX RDF |
|
15 | John E. Hershey, Amy D. Michaelis |
Multiplexed synchronization: an electronic warfare countermeasure. |
IEEE Trans. Commun. |
1991 |
DBLP DOI BibTeX RDF |
|
11 | Aisha Fouad Bushager, Mark Zwolinski |
Modelling Smart Card Security Protocols in SystemC TLM. |
EUC |
2010 |
DBLP DOI BibTeX RDF |
|
11 | Liberios Vokorokos, Anton Baláz, Martin Chovanec |
Distributed Detection System of Security Intrusions Based on Partially Ordered Events and Patterns. |
Towards Intelligent Engineering and Information Technology |
2009 |
DBLP DOI BibTeX RDF |
partially ordered events, distributed system, architecture, sensor, patterns, intrusion detection system |
11 | Masana Murase, Kanna Shimizu, Wilfred Plouffe, Masaharu Sakamoto |
Effective implementation of the cell broadband engineTM isolation loader. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
cell broadband engine(tm), encrypt-then-sign, substituted-ciphertext attack, multi-core, isolation |
11 | Huajun Huang, Shaohong Zhong, Junshan Tan |
Browser-Side Countermeasures for Deceptive Phishing Attack. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Kuo-Hui Yeh, Nai-Wei Lo |
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Djordje Popovic, Giby Raphael, Robin Johnson, Gene Davis, Chris Berka |
Wearable Modular Device for Facilitation of Napping and Optimization of Post-nap Performance. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
Nap, Sleep Deprivation, Performance Optimization, Wearable Devices |
11 | Johan Åkerberg, Mats Björkman |
Exploring Network Security in PROFIsafe. |
SAFECOMP |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache |
Deconvolving Protected Signals. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Wolfgang Boehmer |
Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Matthias Biehl, Welf Löwe |
Automated Architecture Consistency Checking for Model Driven Software Development. |
QoSA |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Keewook Na, Yungeun Kim, Hojung Cha |
Acoustic Sensor Network-Based Parking Lot Surveillance System. |
EWSN |
2009 |
DBLP DOI BibTeX RDF |
Parking-lot surveillance system, Wireless sensor networks, Acoustic source localization |
11 | Tugkan Tuglular, Can Arda Muftuoglu, Özgür Kaya, Fevzi Belli, Michael Linschulte |
GUI-Based Testing of Boundary Overflow Vulnerability. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Hao Yin, Wen Hui, Quan Miao, Zheng Li, Chuang Lin 0002 |
IVForensic: a digital forensics service platform for internet videos. |
ACM Multimedia |
2009 |
DBLP DOI BibTeX RDF |
video fingerprint, digital forensics, digital video |
11 | Zhimin Chen 0002, Syed Haider, Patrick Schaumont |
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-Ta Chen |
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
11 | Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin |
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka |
Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR Antenna. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
ESPAR antenna, key agreement, Cascade, information reconciliation |
11 | Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi |
PIFT: efficient dynamic information flow tracking using secure page allocation. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
control flow validation, security attacks, program validation |
11 | Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet |
Automatic detection of fault attack and countermeasures. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Meiko Jensen, Lijun Liao, Jörg Schwenk |
The curse of namespaces in the domain of XML signature. |
SWS |
2009 |
DBLP DOI BibTeX RDF |
prefix-free canonicalization, signature wrapping, xml namespace injection, xml namespaces, xml signature |
11 | Matthieu Rivain |
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras |
Detecting Spam at the Network Level. |
EUNICE |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Riccardo Focardi, Flaminia L. Luccio, Graham Steel |
Blunting Differential Attacks on PIN Processing APIs. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
Financial Cryptography, PIN Verification, Security APIs |
11 | Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin |
DepenDNS: Dependable Mechanism against DNS Cache Poisoning. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Markus Kasper, Timo Kasper, Amir Moradi 0001, Christof Paar |
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
11 | JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha |
A new fault cryptanalysis on montgomery ladder exponentiation algorithm. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis |
11 | XiaoFeng Wang 0001, Michael K. Reiter |
A multi-layer framework for puzzle-based denial-of-service defense. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Denial of service, Network protocols, Client puzzles |
11 | Rafael Camilo Nunez, Juan G. Gonzalez, Gonzalo R. Arce, John P. Nolan |
Fast and Accurate Computation of the Myriad Filter via Branch-and-Bound Search. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Einoshin Suzuki |
Pitfalls for Categorizations of Objective Interestingness Measures for Rule Discovery. |
Statistical Implicative Analysis |
2008 |
DBLP DOI BibTeX RDF |
data bias, rule bias, expert bias, search bias, objective interestingness measure, rule discovery |
11 | Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel |
Securing Sensor Nodes Against Side Channel Attacks. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Tianjie Cao, Peng Shen, Elisa Bertino |
Cryptanalysis of the LCSS RFID Authentication Protocol. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis |
11 | János Bitó |
On the Markov modeling of digital communication channels. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang |
TCP covert timing channels: Design and detection. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
11 | Rajani Muraleedharan, Lisa Ann Osadciw |
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Cognitive Intelligence, Sensor Network, Ant Colony Optimization, Denial-of-Service |
11 | Thomas Neubauer, Andreas Ekelhart, Stefan Fenz |
Interactive Selection of ISO 27001 Controls under Multiple Objectives. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Kun Peng, Feng Bao 0001 |
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
PBD shuffling, AAAP attack, optimisation, correction |
11 | Ting Wang 0006, Ling Liu 0001 |
Butterfly: Protecting Output Privacy in Stream Mining. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Hiromitsu Kunishima, Hisao Koga, Osamu Muta, Yoshihiko Akaiwa |
On the Effect of Time-Domain Per-Subcarrier Equalization for Band-Limited OQAM Based Multi-Carrier Modulation Systems. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Balázs Matuz, Gianluigi Liva, Cristina Parraga Niebla, Nuria Riera Diaz, Sandro Scalise, Pansoo Kim, Dae-Ig Chang, Ho-Jin Lee |
Link Layer Coding for DVB-S2 Interactive Satellite Services to Trains. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou |
On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
Robustness, Denial of Service, Attacks, Countermeasures, Reliable Server Pooling |
11 | Liang Xie 0002, Hui Song, Trent Jaeger, Sencun Zhu |
A systematic approach for cell-phone worm containment. |
WWW |
2008 |
DBLP DOI BibTeX RDF |
cell phone, patch, turing test |
11 | Kamal Harb, Changcheng Huang, Anand Srinivasan, Brian Cheng |
Intelligent Weather Aware Scheme for Satellite Systems. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Xuhua Ding, Wei Yu 0002, Ying Pan |
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Maciej Nikodem |
DSA Signature Scheme Immune to the Fault Cryptanalysis. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Denis Réal, Vivien Dubois, Anne-Marie Guilloux, Frédéric Valette, M'hamed Drissi |
SCARE of an Unknown Hardware Feistel Implementation. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Yo Mashimo, Shintaro Ueda, Yasutaka Shinzaki, Hiroshi Shigeno |
Examination of Forwarding Obstruction Attacks in Structured Overlay Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Marcus Völp |
Statically Checking Confidentiality of Shared Memory Programs with Dynamic Labels. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
information flow, language-based security |
11 | Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng |
Could SFLASH be Repaired?. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
signature, differential, multivariate cryptography, SFLASH |
11 | David Canright, Lejla Batina |
A Very Compact "Perfectly Masked" S-Box for AES. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
composite Galois field, AES, DPA, S-box, masking |
11 | Sergio Castillo-Perez, Joaquín García-Alfaro |
Anonymous Resolution of DNS Queries. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
Privacy Information Retrieval, Privacy, Anonymity, Domain Name System, IT Security |
11 | Viktor Fischer, Florent Bernard, Nathalie Bochard, Michal Varchola |
Enhancing security of ring oscillator-based trng implemented in FPGA. |
FPL |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu |
An Automatic Mechanism for Sanitizing Malicious Injection. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Konrad Rieck, Stefan Wahl, Pavel Laskov, Peter Domschitz, Klaus-Robert Müller |
A Self-learning System for Detection of Anomalous SIP Messages. |
IPTComm |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Kamal Harb, Changcheng Huang, Anand Srinivasan, Brian Cheng |
Intelligent Weather Systems with Fuzzy Logic Controller for Satellite Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Fei Hu, Steve Wilson, Yang Xiao 0001 |
Correlation-Based Security in Time Synchronization of Sensor Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Frédéric Amiel, Benoit Feix |
On the BRIP Algorithms Security for RSA. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
BRIP, modular multiplication and exponentiation, RSA, Power analysis, collision attacks |
11 | Takashi Hamaguchi, Kazuhiro Takeda, Yukiyasu Shimada, Yoshihiro Hashimoto |
Plant Model Generation for Countermeasures Planning. |
KES (3) |
2008 |
DBLP DOI BibTeX RDF |
Alarm Management, Countermeasures Planning, CE-matrices |
11 | Jie Zhao 0003, Gangfeng Liu, Qinghu Han, Hegao Cai |
A Wheeling-Hopping Combination Scout Robot. |
ICIRA (1) |
2008 |
DBLP DOI BibTeX RDF |
Scout Robot, the Five-shank Hopping Mechanism, Nonlinear Spring-mass Model |
11 | Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara |
A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Julien Francq, Jean-Baptiste Rigaud, Pascal Manet, Assia Tria, Arnaud Tisserand |
Error Detection for Borrow-Save Adders Dedicated to ECC Unit. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Arnaud Boscher, Helena Handschuh |
Masking Does Not Protect Against Differential Fault Attacks. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara |
Anonymous Fingerprinting for Predelivery of Contents. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh |
Enhanced power analysis attack using chosen message against RSA hardware implementations. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Keklik Alptekin Bayam, Siddika Berna Örs |
Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Zhimin Chen 0002, Patrick Schaumont |
Slicing Up a Perfect Hardware Masking Scheme. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Yu Yao, Liqiong Wu, Fuxiang Gao, Wei Yang, Ge Yu 0001 |
A WAW Model of P2P-based Anti-worm. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Michael Backes 0001, Boris Köpf |
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga |
LISABETH: automated content-based signature generator for zero-day polymorphic worms. |
SESS |
2008 |
DBLP DOI BibTeX RDF |
automatic content-based signature generation, intrusion detection, network security, polymorphic worms |
11 | Fengjun Li, Bo Luo, Peng Liu 0005, Anna Cinzia Squicciarini, Dongwon Lee 0001, Chao-Hsien Chu |
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
attribute correlation attack, XML, privacy, information brokering |
11 | Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir |
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
waveform matching, RSA, side-channel attacks, modular exponentiation, power-analysis attacks |
11 | Liu Wenyin, Anthony Y. Fu, Xiaotie Deng |
Exposing Homograph Obfuscation Intentions by Coloring Unicode Strings. |
APWeb |
2008 |
DBLP DOI BibTeX RDF |
|