Sciweavers

20 search results - page 1 / 4
» Yet Another Attack on Vest
Sort
View
AFRICACRYPT
2008
Springer
13 years 6 months ago
Yet Another Attack on Vest
Pascal Delaunay, Antoine Joux
CCS
2007
ACM
13 years 10 months ago
Yet another MicroArchitectural Attack: : exploiting I-Cache
Abstract. MicroArchitectural Attacks (MA), which can be considered as a special form of SideChannel Analysis, exploit microarchitectural functionalities of processor implementation...
Onur Aciiçmez
SECRYPT
2008
107views Business» more  SECRYPT 2008»
13 years 6 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
ACSAC
2008
IEEE
13 years 4 months ago
YAGP: Yet Another Graphical Password Strategy
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wan...
IH
2007
Springer
13 years 10 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath