Sciweavers

197 search results - page 19 / 40
» Is attack better than defense
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
13 years 11 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 1 months ago
Adaptive Systems Require Adaptive Support--When Tools Attack!
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
Jennifer Baldwin, Yvonne Coady
INFOCOM
2008
IEEE
14 years 1 months ago
Spatial-Temporal Characteristics of Internet Malicious Sources
—This paper presents a large scale longitudinal study of the spatial and temporal features of malicious source addresses. The basis of our study is a 402-day trace of over 7 bill...
Zesheng Chen, Chuanyi Ji, Paul Barford
ASIACRYPT
2006
Springer
13 years 11 months ago
New Guess-and-Determine Attack on the Self-Shrinking Generator
We propose a new type of guess-and-determine attack on the self-shrinking generator (SSG). The inherent flexibility of the new attack enables us to deal with different attack condi...
Bin Zhang, Dengguo Feng