Sciweavers

923 search results - page 84 / 185
» Improved Slide Attacks
Sort
View
DSN
2003
IEEE
15 years 9 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
ICIP
2003
IEEE
15 years 9 months ago
Joint source-channel coding scheme for image-in-image data hiding
We consider the problem of hiding images in images. In addition to the usual design constraints such as imperceptible host degradation and robustness in presence of variety of att...
Kaushal Solanki, Onkar Dabeer, B. S. Manjunath, Up...
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 8 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
IM
2007
15 years 5 months ago
Interactive Informatics on Internet Infrastructure
— We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, ...
F. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, ...
APPINF
2003
15 years 5 months ago
Design of an Autonomous Anti-DDoS (A2D2) Network
– The threat of DDoS attack are mainly directed at home and SOHO network that lacks the incentive, expertise, and financial means to defend themselves. This paper proposes an Aut...
Angela Cearns, C. Edward Chow