Sciweavers

923 search results - page 35 / 185
» Improved Slide Attacks
Sort
View
IAT
2007
IEEE
15 years 6 months ago
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bid...
SEC
2007
15 years 1 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
100
Voted
CORR
2010
Springer
212views Education» more  CORR 2010»
14 years 12 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
AINA
2003
IEEE
15 years 3 months ago
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity
The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate ...
Michael W. David, Kouichi Sakurai
EUROCRYPT
2005
Springer
15 years 5 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu