Sciweavers

12183 search results - page 127 / 2437
» Computers under Attacks!
Sort
View
AFRICACRYPT
2010
Springer
15 years 8 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
CCS
2008
ACM
15 years 6 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
JSAC
2008
199views more  JSAC 2008»
15 years 4 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
DCOSS
2006
Springer
15 years 8 months ago
The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study
In this paper, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more lan...
Yingying Chen, Konstantinos Kleisouris, Xiaoyan Li...
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...