Sciweavers

SERSCISA
2009
Springer
13 years 11 months ago
A Kademlia-Based Node Lookup System for Anonymization Networks
Node lookup mechanisms constitute an integral part of any overlay network, and hence also of anonymous communication networks. Today, most anonymizers use centralized directories, ...
Benedikt Westermann, Andriy Panchenko, Lexi Pimeni...
SERSCISA
2009
Springer
13 years 11 months ago
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects
Zhimin Chen, Syed Haider, Patrick Schaumont
SERSCISA
2009
Springer
13 years 11 months ago
The Dark Side of Timed Opacity
Franck Cassez
SERSCISA
2009
Springer
13 years 11 months ago
A Deployment Value Model for Intrusion Detection Sensors
The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different typ...
Siraj A. Shaikh, Howard Chivers, Philip Nobles, Jo...
SERSCISA
2009
Springer
13 years 11 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
SERSCISA
2009
Springer
13 years 11 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim