Sciweavers

241 search results - page 12 / 49
» Passive-Logging Attacks Against Anonymous Communications Sys...
Sort
View
ICICS
1999
Springer
15 years 1 months ago
Reaction Attacks against several Public-Key Cryptosystems
Abstract. We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their ...
Chris Hall, Ian Goldberg, Bruce Schneier
P2P
2009
IEEE
112views Communications» more  P2P 2009»
15 years 4 months ago
SyMon: Defending large structured P2P systems against Sybil Attack
Sybil attack is one of the most challenging problems that plague current decentralized Peer-to-Peer systems. In Sybil attack, a single malicious user creates multiple peer identit...
B. S. Jyothi, D. Janakiram
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
SASN
2005
ACM
15 years 3 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
WISEC
2009
ACM
15 years 4 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru