Sciweavers

1085 search results - page 149 / 217
» A Timing Attack on RC5
Sort
View
NETWORK
2006
290views more  NETWORK 2006»
14 years 9 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
TON
2008
75views more  TON 2008»
14 years 9 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
TPDS
2008
130views more  TPDS 2008»
14 years 9 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
85
Voted
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 3 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
ISMIR
2003
Springer
161views Music» more  ISMIR 2003»
15 years 3 months ago
Improving polyphonic and poly-instrumental music to score alignment
Music alignment links events in a score and points on the audio performance time axis. All the parts of a recording can be thus indexed according to score information. The automat...
Ferréol Soulez, Xavier Rodet, Diemo Schwarz