Sciweavers

1342 search results - page 24 / 269
» Attacks are Protocols Too
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
CORR
2010
Springer
212views Education» more  CORR 2010»
13 years 7 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
ICC
2007
IEEE
14 years 1 months ago
Combating Against Attacks on Encrypted Protocols
Zubair Md. Fadlullah, Tarik Taleb, Nirwan Ansari, ...
ISCC
2005
IEEE
14 years 1 months ago
Detection of Web-Based Attacks through Markovian Protocol Parsing
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...