Sciweavers

372 search results - page 35 / 75
» On the Security of a Unified Countermeasure
Sort
View
ESORICS
2009
Springer
14 years 8 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
PET
2009
Springer
14 years 2 months ago
Physical Layer Attacks on Unlinkability in Wireless LANs
Abstract. Recent work has focused on hiding explicit network identifiers such as hardware addresses from the link layer to enable anonymous communications in wireless LANs. These ...
Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk ...
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
14 years 1 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent
WPES
2004
ACM
14 years 1 months ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames