Sciweavers

135 search results - page 12 / 27
» Encompassing Attacks to Attacks in Abstract Argumentation Fr...
Sort
View
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 1 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
CN
2006
79views more  CN 2006»
13 years 7 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
AFRICACRYPT
2010
Springer
13 years 10 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
ESORICS
2009
Springer
14 years 8 months ago
Data Structures with Unpredictable Timing
Abstract. A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an ...
Darrell Bethea, Michael K. Reiter
IFIPTM
2009
89views Management» more  IFIPTM 2009»
13 years 5 months ago
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing
Abstract. Information is essential to decision making. Nowadays, decision makers are often overwhelmed with large volumes of information, some of which may be inaccurate, incorrect...
Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino