Sciweavers

1294 search results - page 50 / 259
» Securing Against Insider Attacks
Sort
View
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
13 years 1 months ago
Securing Circuits against Constant-Rate Tampering
We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et al. ...
Dana Dachman-Soled, Yael Tauman Kalai
ICOIN
2007
Springer
15 years 5 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
FC
2009
Springer
135views Cryptology» more  FC 2009»
15 years 5 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
116
Voted
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
15 years 4 days ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
CCR
2007
119views more  CCR 2007»
14 years 11 months ago
An edge-to-edge filtering architecture against DoS
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spooï...
Felipe Huici, Mark Handley