Sciweavers

1369 search results - page 56 / 274
» A Practical Implementation of the Timing Attack
Sort
View
90
Voted
IWNAS
2008
IEEE
15 years 5 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
103
Voted
EWCBR
1998
Springer
15 years 3 months ago
Case-Based Reasoning in CARE-PARTNER: Gathering Evidence for Evidence-Based Medical Practice
This paper presents the CARE-PARTNER system. Functionally, it offers via the WWW knowledge-support assistance to clinicians responsible for the long-term follow-up of stem-cell pos...
Isabelle Bichindaritz, Emin Kansu, Keith M. Sulliv...
115
Voted
AFRICACRYPT
2010
Springer
15 years 5 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
79
Voted
EUC
2007
Springer
15 years 2 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
70
Voted
SP
2009
IEEE
15 years 5 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich