Sciweavers

12183 search results - page 113 / 2437
» Computers under Attacks!
Sort
View
ITCC
2005
IEEE
15 years 10 months ago
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...
Alireza Hodjat, David Hwang, Ingrid Verbauwhede
DISCEX
2003
IEEE
15 years 10 months ago
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies
Under sponsorship of the Defense Advanced Research Projects Agency’s (DARPA) Fault Tolerant Networks (FTN) program, The Johns Hopkins University Applied Physics Laboratory (JHU/...
W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. ...
GLOBECOM
2010
IEEE
15 years 2 months ago
Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks
We propose a spectrum decision protocol resilient to primary user emulation attacks (PUEA) in dynamic spectrum access networks. PUEA is a type of denial-of-service attack that can ...
Z. Jin, S. Anand, K. P. Subbalakshmi
ESORICS
2011
Springer
14 years 4 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
ECEASST
2010
15 years 1 months ago
Open Source Verification under a Cloud
Abstract: An experiment in providing volunteer cloud computing support for automated audits of open source code is described here, along with the supporting theory. Certification a...
Peter T. Breuer, Simon Pickin