Sciweavers

1294 search results - page 24 / 259
» Securing Against Insider Attacks
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
P-Coding: Secure Network Coding against Eavesdropping Attacks
Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, X...
ESORICS
1998
Springer
14 years 22 days ago
Side Channel Cryptanalysis of Product Ciphers
Building on the work of Kocher[Koc96], Jaffe, and Yun [KJY98], we discuss the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion o...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 6 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
WWW
2005
ACM
14 years 9 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham