Sciweavers

12183 search results - page 171 / 2437
» Computers under Attacks!
Sort
View
NOSSDAV
2010
Springer
15 years 10 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
CHI
2005
ACM
16 years 5 months ago
Applying the lessons of the attack on the world trade center, 11th September 2001, to the design and use of interactive evacuati
The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public atte...
C. W. Johnson
CCGRID
2006
IEEE
15 years 11 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
197
Voted
DSN
2005
IEEE
15 years 10 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
134
Voted
PKC
2005
Springer
89views Cryptology» more  PKC 2005»
15 years 10 months ago
A New Related Message Attack on RSA
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms xe mod N and (ax + b)e mod N for known constants a, b ∈ ZN , one can compute x in O(e log2 e) ZN -o...
Oded Yacobi, Yacov Yacobi