Sciweavers

1342 search results - page 29 / 269
» Attacks are Protocols Too
Sort
View
RFIDSEC
2010
14 years 6 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
NDSS
2002
IEEE
15 years 4 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
89
Voted
PDCAT
2004
Springer
15 years 5 months ago
Attack Resiliency of Network Topologies
Network topology has no direct effect on the correctness of network protocols, however, it influences on the performance of networks and the survivability of the networks under at...
Heejo Lee, Jong Kim
NDSS
1997
IEEE
15 years 4 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
CCR
2004
106views more  CCR 2004»
14 years 11 months ago
Beware of BGP attacks
This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and...
Ola Nordström, Constantinos Dovrolis