Sciweavers

1085 search results - page 97 / 217
» A Timing Attack on RC5
Sort
View
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 4 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
FSE
2011
Springer
218views Cryptology» more  FSE 2011»
14 years 1 months ago
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to fou...
Jérémy Jean, Pierre-Alain Fouque
AICCSA
2006
IEEE
128views Hardware» more  AICCSA 2006»
15 years 4 months ago
Avoiding Denial of Service via Stress Testing
Stress-testing has been widely used by businesses, governments, and other organizations to evaluate the strength of their web applications against various attacks. However, the qu...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
ANSS
2001
IEEE
15 years 1 months ago
Models of Complex Physical Systems Using Cell-DEVS
We present the definition of diverse models of physical systems using the Cell-DEVS paradigm. Cell-DEVS is an extension of the DEVS formalism that allows the definition of cellula...
Javier Ameghino, Alejandro Troccoli, Gabriel A. Wa...
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
13 years 5 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross