Sciweavers

47 search results - page 3 / 10
» Evaluation of Sybil Attacks Protection Schemes in KAD
Sort
View
PCM
2004
Springer
116views Multimedia» more  PCM 2004»
14 years 4 months ago
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present pape...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
AVI
2006
14 years 7 days ago
Design and evaluation of a shoulder-surfing resistant graphical password scheme
When users input their passwords in a public place, they may be at risk of attackers stealing their password. An attacker can capture a password by direct observation or by record...
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, Je...
IOLTS
2006
IEEE
100views Hardware» more  IOLTS 2006»
14 years 4 months ago
A Note on Error Detection in an RSA Architecture by Means of Residue Codes
Recently, various attacks have been proposed against many cryptosystems, exploiting deliberate error injection during the computation process. In this paper, we add a residue-base...
Luca Breveglieri, Paolo Maistri, Israel Koren
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 12 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
ESORICS
2011
Springer
12 years 10 months ago
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
Abstract. Cloud computing is a new computing paradigm that is gaining increased popularity. More and more sensitive user data are stored in the cloud. The privacy of users’ acces...
Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao