Sciweavers

2503 search results - page 98 / 501
» Building Computer Network Attacks
Sort
View
103
Voted
INFOCOM
2000
IEEE
15 years 6 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
IJNSEC
2008
166views more  IJNSEC 2008»
15 years 1 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
NDSS
2002
IEEE
15 years 6 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
WSC
1997
15 years 2 months ago
Simulation of Computer Systems and Applications
The modeling of computer systems, particularly distributed systems, is presented with an emphasis on the system characteristics that are important to the model and some general me...
William S. Keezer
AC
2004
Springer
15 years 1 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson