Sciweavers

507 search results - page 46 / 102
» Attacking DDoS at the Source
Sort
View
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
13 years 9 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
COLCOM
2005
IEEE
15 years 3 months ago
An experimental evaluation of spam filter performance and robustness against attack
— In this paper, we show experimentally that learning filters are able to classify large corpora of spam and legitimate email messages with a high degree of accuracy. The corpor...
Steve Webb, Subramanyam Chitti, Calton Pu
INDOCRYPT
2005
Springer
15 years 3 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
SAC
2009
ACM
15 years 2 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
ECR
2006
107views more  ECR 2006»
14 years 9 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg