Sciweavers

12183 search results - page 106 / 2437
» Computers under Attacks!
Sort
View
CRYPTO
1992
Springer
156views Cryptology» more  CRYPTO 1992»
15 years 8 months ago
DES is not a Group
We prove that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. This implies that, in general, multiple DES-encry...
Keith W. Campbell, Michael J. Wiener
148
Voted
ICC
2007
IEEE
15 years 11 months ago
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment
— A novel client puzzle protocol, the Memoryless Puzzle Protocol (MPP), is proposed and investigated. The goal is to show that MPP is a viable solution for mitigating distributed...
Nicholas A. Fraser, Douglas J. Kelly, Richard A. R...
136
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Evaluating DoS Attacks against Sip-Based VoIP Systems
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...
M. Zubair Rafique, M. Ali Akbar, Muddassar Farooq
110
Voted
IJHPCN
2008
75views more  IJHPCN 2008»
15 years 4 months ago
Enhancing GridFTP performance using intelligent gateways
: To improve throughput of grid data servers under heavy loads or under denial of service attacks, it is important to service requests differentially, giving preference to ongoing ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
WISEC
2009
ACM
15 years 11 months ago
Practical attacks against WEP and WPA
Erik Tews, Martin Beck