Sciweavers

1101 search results - page 118 / 221
» On the Security and Vulnerability of PING
Sort
View
USS
2008
15 years 6 days ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
14 years 12 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
LISA
2001
14 years 11 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
COMCOM
2008
91views more  COMCOM 2008»
14 years 10 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
ESORICS
2011
Springer
13 years 9 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri