Sciweavers

392 search results - page 5 / 79
» Security vulnerabilities in IEEE 802.22
Sort
View
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
15 years 7 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
15 years 3 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
CSFW
2010
IEEE
15 years 5 months ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
ACSAC
2009
IEEE
15 years 5 months ago
Reflections on UNIX Vulnerabilities
The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded it...
Matt Bishop