Sciweavers

476 search results - page 2 / 96
» A New Attack against Khazad
Sort
View
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 7 days ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
CORR
2010
Springer
55views Education» more  CORR 2010»
13 years 4 months ago
Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order
We consider the problem of constructing optimal authentication codes with splitting. New infinite families of such codes are obtained. In particular, we establish the first known...
Yeow Meng Chee, Xiande Zhang, Hui Zhang
INFOCOM
2010
IEEE
13 years 4 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 3 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
CCS
2010
ACM
13 years 4 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov