Sciweavers

12183 search results - page 88 / 2437
» Computers under Attacks!
Sort
View
ANCS
2006
ACM
15 years 6 months ago
Scalable network-based buffer overflow attack detection
Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh
IPPS
2010
IEEE
15 years 2 months ago
Efficient DHT attack mitigation through peers' ID distribution
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
EUROCRYPT
2001
Springer
15 years 9 months ago
Identification Protocols Secure against Reset Attacks
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...