Sciweavers

1085 search results - page 3 / 217
» A Timing Attack on RC5
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
—We discuss malicious interference based denial of service (DoS) attacks in multi-band covert timing networks using an adversarial game theoretic approach. A covert timing networ...
Santhanakrishnan Anand, Shamik Sengupta, Rajarathn...
GLOBECOM
2010
IEEE
13 years 5 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright
ESORICS
2011
Springer
12 years 7 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
INFOCOM
2010
IEEE
13 years 5 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
DIMVA
2011
12 years 11 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner