Sciweavers

12183 search results - page 15 / 2437
» Computers under Attacks!
Sort
View
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
14 years 3 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 9 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
CN
2006
98views more  CN 2006»
13 years 10 months ago
Internet resiliency to attacks and failures under BGP policy routing
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and attacks, under the real constraint of business agreements between the ASs. The ag...
Danny Dolev, Sugih Jamin, Osnat Mokryn, Yuval Shav...
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
13 years 7 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
TC
2002
13 years 9 months ago
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...