Sciweavers

2503 search results - page 98 / 501
» Building Computer Network Attacks
Sort
View
INFOCOM
2000
IEEE
15 years 2 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
IJNSEC
2008
166views more  IJNSEC 2008»
14 years 10 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
NDSS
2002
IEEE
15 years 2 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
WSC
1997
14 years 11 months ago
Simulation of Computer Systems and Applications
The modeling of computer systems, particularly distributed systems, is presented with an emphasis on the system characteristics that are important to the model and some general me...
William S. Keezer
AC
2004
Springer
14 years 9 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson