Sciweavers

12183 search results - page 19 / 2437
» Computers under Attacks!
Sort
View
82
Voted
SIGMOBILE
2010
59views more  SIGMOBILE 2010»
14 years 8 months ago
Frequency quorum rendezvous for fast and resilient key establishment under jamming attack
Eun-Kyu Lee, Soon-Young Oh, Mario Gerla
FSE
2007
Springer
103views Cryptology» more  FSE 2007»
15 years 8 months ago
Improved Slide Attacks
Abstract. The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The slide attack leverages simple attacks on ...
Eli Biham, Orr Dunkelman, Nathan Keller
ICDCS
2007
IEEE
15 years 8 months ago
Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks
Effective mechanisms for detecting and thwarting Distributed Denial-of-Service (DDoS) attacks are becoming increasingly important to the success of today’s Internet as a viable ...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
104
Voted
CCS
2004
ACM
15 years 7 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno