Sciweavers

1369 search results - page 125 / 274
» A Practical Implementation of the Timing Attack
Sort
View
91
Voted
ACSAC
2008
IEEE
15 years 5 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
IEEEARES
2006
IEEE
15 years 5 months ago
Secure Enhanced Wireless Transfer Protocol
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang
NETWORK
2006
290views more  NETWORK 2006»
14 years 11 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 7 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
ISAAC
2005
Springer
113views Algorithms» more  ISAAC 2005»
15 years 4 months ago
A Simple Optimal Randomized Algorithm for Sorting on the PDM
Abstract. The Parallel Disks Model (PDM) has been proposed to alleviate the I/O bottleneck that arises in the processing of massive data sets. Sorting has been extensively studied ...
Sanguthevar Rajasekaran, Sandeep Sen