Sciweavers

1294 search results - page 69 / 259
» Securing Against Insider Attacks
Sort
View
NDSS
2002
IEEE
15 years 9 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 10 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
IJNSEC
2006
75views more  IJNSEC 2006»
15 years 4 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
13 years 11 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
CSFW
2008
IEEE
15 years 10 months ago
Composition of Password-Based Protocols
We investigate the composition of protocols that share a common secret. This situation arises when users employ the same password on different services. More precisely we study w...
Stéphanie Delaune, Steve Kremer, Mark Ryan