Sciweavers

12183 search results - page 137 / 2437
» Computers under Attacks!
Sort
View
ICCSA
2005
Springer
15 years 10 months ago
Fault Attack on the DVB Common Scrambling Algorithm
Abstract. The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a strea...
Kai Wirt
ICCS
2004
Springer
15 years 10 months ago
Artificial Immune System against Viral Attack
Since the first computer virus has been found, scanning detection has been used as a primarily method in virus detection systems. As computer viruses and worms become more complex ...
Hyungjoon Lee, Wonil Kim, Manpyo Hong
136
Voted
NCA
2009
IEEE
15 years 11 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal
NETWORK
2011
14 years 11 months ago
Selective jamming/dropping insider attacks in wireless mesh networks
—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Loukas Lazos, Marwan Krunz
EUC
2005
Springer
15 years 10 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...