Sciweavers

3451 search results - page 126 / 691
» Collaborative attack modeling
Sort
View
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
15 years 8 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 2 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
ICUMT
2009
15 years 5 days ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
116
Voted
JCS
2011
72views more  JCS 2011»
14 years 9 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
16 years 2 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous