Sciweavers

1085 search results - page 94 / 217
» A Timing Attack on RC5
Sort
View
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 1 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
DBSEC
2006
125views Database» more  DBSEC 2006»
14 years 11 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
IJHPCN
2008
75views more  IJHPCN 2008»
14 years 10 months ago
Enhancing GridFTP performance using intelligent gateways
: To improve throughput of grid data servers under heavy loads or under denial of service attacks, it is important to service requests differentially, giving preference to ongoing ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
RAID
2010
Springer
14 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
CORR
2011
Springer
156views Education» more  CORR 2011»
14 years 1 months ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.