Sciweavers

362 search results - page 3 / 73
» Extending the Resynchronization Attack
Sort
View
JAIR
2011
214views more  JAIR 2011»
12 years 10 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
PCM
2004
Springer
190views Multimedia» more  PCM 2004»
14 years 22 days ago
Mapping Energy Video Watermarking Algorithm Based on Compressed Domain
The paper presents a novel video watermarking scheme called Mapping Energy video Watermarking (MEW) for copyright protection. The watermark is embedded in the compressed domain and...
Lijun Wang, Hongxun Yao, Shaohui Liu, Wen Gao
ACSAC
2006
IEEE
14 years 1 months ago
Extended Protection against Stack Smashing Attacks without Performance Loss
In this paper we present an efficient countermeasure against stack smashing attacks. Our countermeasure does not rely on secret values (such as canaries) and protects against att...
Yves Younan, Davide Pozza, Frank Piessens, Wouter ...
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 1 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
COMMA
2010
13 years 2 months ago
Reasoning about Preferences in Structured Extended Argumentation Frameworks
Abstract. This paper combines two recent extensions of Dung's abstract argumenrameworks in order to define an abstract formalism for reasoning about preferences in structured ...
Sanjay Modgil, Henry Prakken