Sciweavers

499 search results - page 95 / 100
» A Study on Latent Vulnerabilities
Sort
View
CRYPTO
2003
Springer
137views Cryptology» more  CRYPTO 2003»
14 years 19 days ago
New Partial Key Exposure Attacks on RSA
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...
Johannes Blömer, Alexander May
GECCO
2003
Springer
107views Optimization» more  GECCO 2003»
14 years 19 days ago
A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria
The formation of fruiting bodies by myxobacteria colonies involves altruistic suicide by many individual bacteria and is thus vulnerable to exploitation by cheating mutants. We rep...
Ying Xiao, Winfried Just
SAC
2009
ACM
14 years 2 days ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
IPPS
1998
IEEE
13 years 11 months ago
Performance Analysis of a Fault-Tolerant Scheme for Location Management of Mobile Hosts
We consider the problem of location management of mobile users. The objective is to keep track of the mobile users in order to deliver calls. The IS-41 is a simple strategy for loc...
Saad Biaz, Nitin H. Vaidya
26
Voted
PET
2010
Springer
13 years 11 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...