Sciweavers

562 search results - page 11 / 113
» Attack graph generation and analysis
Sort
View
WISTP
2010
Springer
14 years 2 months ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
14 years 1 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
IJNSEC
2006
81views more  IJNSEC 2006»
13 years 7 months ago
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failu...
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
OSDI
2006
ACM
14 years 8 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
IACR
2011
182views more  IACR 2011»
12 years 7 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi