Sciweavers

12183 search results - page 94 / 2437
» Computers under Attacks!
Sort
View
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
ICCV
2001
IEEE
16 years 6 months ago
Probabilistic Framework for Segmenting People Under Occlusion
Ahmed M. Elgammal, Larry S. Davis
INDOCRYPT
2005
Springer
15 years 10 months ago
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in ...
Claude Carlet
WDAG
2005
Springer
101views Algorithms» more  WDAG 2005»
15 years 10 months ago
Keeping Denial-of-Service Attackers in the Dark
Abstract. We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with so...
Gal Badishi, Amir Herzberg, Idit Keidar
WISEC
2009
ACM
15 years 11 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel