Sciweavers

157 search results - page 1 / 32
» Counteracting Oracle attacks
Sort
View
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
13 years 10 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
TDHMS
2008
13 years 3 months ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
INFORMATICASI
2010
13 years 2 months ago
Planning to Discover and Counteract Attacks
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
ACSC
2003
IEEE
13 years 10 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
APCHI
2008
IEEE
13 years 11 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo