Sciweavers

197 search results - page 15 / 40
» Is attack better than defense
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Multimedia content authentication: fundamental limits
In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop a m...
Emin Martinian, Gregory W. Wornell
CCS
2006
ACM
13 years 11 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
ICDAR
2005
IEEE
14 years 1 months ago
ScatterType: A Legible but Hard-to-Segment CAPTCHA
The ScatterType CAPTCHA, designed to resist character– segmentation attacks and shown to be highly legible to human readers, is analyzed for vulnerabilities and is offered for e...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 7 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 1 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson