Sciweavers

12183 search results - page 105 / 2437
» Computers under Attacks!
Sort
View
155
Voted
INDOCRYPT
2007
Springer
15 years 10 months ago
Linearization Attacks Against Syndrome Based Hashes
Abstract. In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory pro...
Markku-Juhani Olavi Saarinen
168
Voted
TIFS
2011
253views Education» more  TIFS 2011»
14 years 11 months ago
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
—Sensor photo-response non-uniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including digital-camera ballistics in which an image is ...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen
CCS
2005
ACM
15 years 10 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
CCS
2006
ACM
15 years 8 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
ICIP
2002
IEEE
16 years 6 months ago
Nonadditive Gaussian watermarking and its application to wavelet-based image watermarking
This paper extends our recent game-theoretic approach [1] to design and embed watermarks in Gaussian signals in the presence of an adversary. The detector solves a binary hypothes...
Pierre Moulin, Aleksandar Ivanovic