Sciweavers

5804 search results - page 16 / 1161
» Doing more with less
Sort
View
WISA
2007
Springer
15 years 4 months ago
Breaking 104 Bit WEP in Less Than 60 Seconds
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed i...
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
CIMCA
2006
IEEE
15 years 4 months ago
Direct Adaptive Fuzzy Control with Less Restrictions on the Control Gain
: In the adaptive fuzzy control field for affine nonlinear systems, there are two basic configurations: direct and indirect. It is well known that the direct configuration needs mo...
Phi Anh Phan, Timothy J. Gale
CCS
2010
ACM
14 years 10 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
JSA
2006
131views more  JSA 2006»
14 years 10 months ago
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used
Interprocedural data flow analyses of executable programs suffer from the conservative assumptions that need to be made because no precise control flow graph is available and beca...
Bjorn De Sutter, Bruno De Bus, Koen De Bosschere
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 7 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen