Sciweavers

541 search results - page 83 / 109
» A generic attack to ciphers
Sort
View
IACR
2011
292views more  IACR 2011»
12 years 7 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
WSC
2007
13 years 10 months ago
Hospital capacity planning for efficient disaster mitigation during a bioterrorist attack
Effective hospital capacity planning can not only significantly enhance the capability and effectiveness of the treatment provided to patients during a bioterrorist attack but can...
Jomon Aliyas Paul, Govind Hariharan
GPCE
2007
Springer
14 years 2 months ago
Preventing injection attacks with syntax embeddings
Software written in one language often needs to construct sentences in another language, such as SQL queries, XML output, or shell command invocations. This is almost always done ...
Martin Bravenboer, Eelco Dolstra, Eelco Visser
OTM
2007
Springer
14 years 2 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...
ASIACRYPT
2001
Springer
14 years 13 days ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval