The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (25) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (49) 1997 (54) 1998 (91) 1999 (127) 2000 (178) 2001 (305) 2002 (401) 2003 (619) 2004 (891) 2005 (1329) 2006 (1476) 2007 (1521) 2008 (1575) 2009 (1264) 2010 (664) 2011 (689) 2012 (796) 2013 (775) 2014 (964) 2015 (1038) 2016 (1142) 2017 (1394) 2018 (1628) 2019 (319)
Publication types (Num. hits)
article(5802) book(8) incollection(134) inproceedings(13377) phdthesis(134) proceedings(9)
Venues (Conferences, Journals, ...)
CoRR(853) IACR Cryptology ePrint Archive(768) RAID(256) ACM Conference on Computer and...(216) FSE(187) CHES(178) CRYPTO(163) ACSAC(146) EUROCRYPT(143) ICC(135) ARES(131) IEICE Transactions(126) ASIACRYPT(121) ACISP(119) IEEE Trans. Information Forens...(118) GLOBECOM(117) More (+10 of total 2653)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11111 occurrences of 2966 keywords

Results
Found 19464 publication records. Showing 19464 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
84Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan A prediction-based detection algorithm against distributed denial-of-service attacks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF available service rate, prediction-based detection of DDoS and low-rate TCP attacks, distributed DoS (DDoS), denial-of-service attacks (DoS)
78Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
73Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
68Adam L. Young, Moti Yung Bandwidth-Optimal Kleptographic Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory
55Dov M. Gabbay Semantics for Higher Level Attacks in Extended Argumentation Frames Part 1: Overview. Search on Bibsonomy Studia Logica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF extended argumentations frames, semantics for attacks on attacks, joint attacks
55Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis
55Tae Hwan Kim, Dong Seong Kim, Sang Min Lee, Jong Sou Park Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing
53Frédéric Didier Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast algebraic attacks, Wiedemann’s algorithm, algebraic attacks, algebraic immunity
53Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
52Srinivas Mukkamala, Andrew H. Sung Computational Intelligent Techniques for Detecting Denial of Service Attacks. Search on Bibsonomy IEA/AIE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
51Zhenghong Wang, Ruby B. Lee New cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, cache, computer architecture, processor, timing attacks, side channel
50Alexei Czeskis, Karl Koscher, Joshua R. Smith, Tadayoshi Kohno RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-aware communications, passive gesture recognition, proxy attacks, rfid device selection, skimming attacks, privacy, gesture recognition, rfid, relay attacks, man-in-the-middle attacks
50Lanjun Dang, Weidong Kou, Yuxia Xiao An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks
49Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fast Algebraic Attacks, Boolean Functions, Stream Ciphers, Algebraic Attacks, Symmetric Functions, Algebraic Degree
49Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
49Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
47Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi Multi-channel Attacks. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA
47Frederik Armknecht, Matthias Krause 0001, Dirk Stegemann Design Principles for Combiners with Memory. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF combiners with memory, Bluetooth E0, Stream cipher, algebraic attacks, correlation attacks
46Chetan Parampalli, R. Sekar, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
45Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF application layer attacks, site security monitoring, anomaly detection, information entropy, denial-of-service attacks
45MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
45Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel Securing Sensor Nodes Against Side Channel Attacks. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu 0001 Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. Search on Bibsonomy TWEB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF client transparency, game theory, Web servers, DoS Attacks
43Chong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Smart cards, fault injection, faults attacks, DSA, ElGamal, side channel
43Sanjeev Kumar, Einar Petana Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security
43Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert Sign Change Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptosystem, smartcards, fault attacks
43Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
43Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong Padding Oracle Attacks on Multiple Modes of Operation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Padding oracle attacks, Multiple modes of operation, Block ciphers
43Gaël Hachez, Jean-Jacques Quisquater Montgomery Exponentiation with no Final Subtractions: Improved Results. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF smart cards, Montgomery multiplication, timing attacks, modular exponentiation, power attacks
42Shafi Goldwasser Cryptography without (Hardly Any) Secrets ? Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Itai Dinur, Adi Shamir Cube Attacks on Tweakable Black Box Polynomials. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium
42Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly Impact of denial of service attacks on ad hoc networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF black hole attacks, ad hoc networks, DoS attacks
42Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt Regional-based authentication against dos attacks in wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service (DoS) attacks, wireless LAN, impersonation attacks
41Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
41Arnaud Boscher, Helena Handschuh Masking Does Not Protect Against Differential Fault Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Dorgham Sisalem, Jiri Kuthan, Sven Ehlert Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. Search on Bibsonomy IEEE Network The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Johannes Blömer, Alexander May 0001 New Partial Key Exposure Attacks on RSA. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Kahil Jallad, Jonathan Katz, Bruce Schneier Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
40Francesco Regazzoni, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Thanh-Ha Le, Cécile Canovas, Jessy Clédière An overview of side channel analysis attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attacks, stochastic model, DPA, DEMA, CPA, template attack
39Pankaj Kohli, Bezawada Bruhadeshwar FormatShield: A Binary Rewriting Defense against Format String Attacks. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Format String Attacks, Intrusion Detection, System Security, Binary Rewriting
39Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
39Igor V. Kotenko, Alexander Ulanov Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cooperative distributed defence, Simulation, DDoS, Network attacks
39Kameswari Kotapati, Peng Liu, Thomas F. La Porta Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks? Search on Bibsonomy Telecommunication Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile telecommunication networks, Cascading attacks, Infection propagation rules, 3G networks, Vulnerability assessment, Dependency model
39Sruthi Bandhakavi, Prithvi Bisht, P. Madhusudan, V. N. Venkatakrishnan CANDID: preventing sql injection attacks using dynamic candidate evaluations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic monitoring, retrofitting code, sql injection attacks, symbolic evaluation
39Simon P. Chung, Aloysius K. Mok Advanced Allergy Attacks: Does a Corpus Really Help? Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Allergy Attacks, Intrusion Prevention Systems
39Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure overlay forwarding system, DDoS attacks
39Mustapha Hedabou Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map
39Peng Ning, Dingbang Xu Hypothesizing and reasoning about attacks missed by intrusion detection systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Intrusion alert correlation, missed attacks, intrusion detection
39Alefiya Hussain, John S. Heidemann, Christos Papadopoulos A framework for classifying denial of service attacks. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, measurement, time series analysis, denial of service attacks
39Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations
39Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF waveform matching, RSA, side-channel attacks, modular exponentiation, power-analysis attacks
38Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque E-NIPS: An Event-Based Network Intrusion Prediction System. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion detection and prediction, attack classes, network security
38Jacques Patarin Security of Random Feistel Schemes with 5 or More Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
38Billy Bob Brumley, Risto M. Hakala Cache-Timing Template Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cache-timing attacks, elliptic curve cryptography, side channel attacks
38Andrey Bogdanov Multiple-Differential Side-Channel Collision Attacks on AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, AES, collision detection, side-channel attacks, DPA
38Andrey Bogdanov Improved Side-Channel Collision Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks
38Onur Aciiçmez, Çetin Kaya Koç Trace-Driven Cache Attacks on AES (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trace-driven attacks, AES, Side-channel Analysis, cache attacks
38An Yu, David S. Brée A Clock-less Implementation of the AES Resists to Power and Timing Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF clock-less circuits, AES, timing attacks, cryptosystems, power attacks
38Nicolas Courtois, Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations
37Elias Levy Interface Illusions. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Web browser attacks, address-bar spoofing, XUL attacks, hijacking, GUI, attacks, event models
37Joana Treger, Jacques Patarin Generic Attacks on Feistel Networks with Internal Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37François-Xavier Standaert, François Koeune, Werner Schindler How to Compare Profiled Side-Channel Attacks?. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Yi Xie, Shun-Zheng Yu A Novel Model for Detecting Application Layer DDoS Attacks. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set
37Xiapu Luo, Rocky K. C. Chang, Edmond W. W. Chan Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. Search on Bibsonomy MASCOTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood 0001 The feasibility of launching and detecting jamming attacks in wireless networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF jammer detection, denial of service, jamming
37Raphael Chung-Wei Phan Related-Key Attacks on Triple-DES and DESX Variants. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Kevin P. Anchor, Jesse B. Zydallis, Gregg H. Gunsch, Gary B. Lamont Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks. Search on Bibsonomy EMO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier Fault Attacks on RSA Signatures with Partially Unknown Messages. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s theorem, iso/iec 9796-2, digital signatures, rsa, Fault attacks
35Ke Li, Wanlei Zhou, Shui Yu, Bo Dai Effective DDoS Attacks Detection Using Generalized Entropy Metric. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF generalized entropy, DDoS, attacks detection
35Josep Lluis Berral, Nicolás Poggi, Javier Alonso, Ricard Gavaldà, Jordi Torres, Manish Parashar Adaptive distributed mechanism against flooding network attacks based on machine learning. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF DDOS, machine learning, intrusion detection, cooperative, autonomic computing, flooding attacks
35Meiko Jensen, Nils Gruschka, Norbert Luttenberger The Impact of Flooding Attacks on Network-based Services. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Services, availability, DoS, attacks, flooding
35Michael Gorski, Stefan Lucks, Thomas Peyrin Slide Attacks on a Class of Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks
35Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filter function, stream ciphers, initialization, algebraic attacks, clock-control
35Yajuan Tang, Xiapu Luo, Rocky K. C. Chang Protecting Internet Services from Low-Rate DoS Attacks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-rate DoS attacks, detection, Feedback control, countermeasures
35Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
35Jonathon T. Giffin, Somesh Jha, Barton P. Miller Automated Discovery of Mimicry Attacks. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IDS evaluation, model-based anomaly detection, model checking, attacks
35Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu 0001 A Client-Transparent Approach to Defend Against Denial of Service Attacks. Search on Bibsonomy SRDS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Client Transparency, Denial of Service (DoS) attacks, Authentication, Availability, Web Servers
35Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau Countermeasures for Preventing Comb Method Against SCA Attacks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication
35Matias Madou, Bertrand Anckaert, Bjorn De Sutter, Koen De Bosschere Hybrid static-dynamic attacks against software protection mechanisms. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF watermarking, attacks, intellectual property, obfuscation, software protection, tamper-resistance
35André Adelsbach, Stefan Katzenbeisser 0001, Helmut Veith Watermarking schemes provably secure against copy and ambiguity attacks. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF protocol attacks, watermarking, multimedia security
35Nathalie Weiler Honeypots for Distributed Denial of Service Attacks. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security Practices, Honeypot, Distributed Denial of Service Attacks
35Sreekanth Malladi, Jim Alves-Foss What are Multi-Protocol Guessing Attacks and How to Prevent Them. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE
35Philippe Chose, Antoine Joux, Michel Mitton Fast Correlation Attacks: An Algorithmic Point of View. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF match-and-sort, algorithmics, cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, parity-checks
35Raphael Chung-Wei Phan, Soichi Furuya Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule
35Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han On the Security of the Full-Band Image Watermark for Copyright Protection. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Full-band image watermark, constructive attacks, destructive attacks, image embedding, copyright protection, image extraction
35Stefan Tillich, Christoph Herbst Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking
35Shay Gueron, Jean-Pierre Seifert Is It Wise to Publish Your Public RSA Keys? Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks
35Julien Cathalo, François Koeune, Jean-Jacques Quisquater A New Type of Timing Attack: Application to GPS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes
34Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy J. Cryptology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular
34Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
34Hilmi Günes Kayacik, A. Nur Zincir-Heywood Using self-organizing maps to build an attack map for forensic analysis. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KDD 99 intrusion detection datasets, neural networks, intrusion detection, self-organizing map
34Zili Shao, Qingfeng Zhuge, Yi He 0001, Edwin Hsing-Mean Sha Defending Embedded Systems Against Buffer Overflow via Hardware/Software. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Walter Hohl, Xuejia Lai, Thomas Meier 0001, Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 19464 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license