Sciweavers

476 search results - page 55 / 96
» A New Attack against Khazad
Sort
View
CN
2000
95views more  CN 2000»
13 years 9 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
14 years 3 months ago
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
The Unbalanced Oil and Vinegar scheme (UOV) is a signature scheme based on multivariate quadratic equations. It uses m equations and n variables. A total of v of these are called ...
An Braeken, Christopher Wolf, Bart Preneel
NDSS
2005
IEEE
14 years 3 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
14 years 1 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
GLOBECOM
2008
IEEE
13 years 11 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair