Sciweavers

392 search results - page 5 / 79
» Security vulnerabilities in IEEE 802.22
Sort
View
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
14 years 1 months ago
Physical Security and Vulnerability Modeling for Infrastructure Facilities
Dean A. Jones, Chad E. Davis, Mark A. Turnquist, L...
HICSS
2010
IEEE
114views Biometrics» more  HICSS 2010»
13 years 9 months ago
Measuring Similarity for Security Vulnerabilities
Ju An Wang, Linfeng Zhou, Minzhe Guo, Hao Wang, Ja...
CSFW
2010
IEEE
13 years 11 months ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
ACSAC
2009
IEEE
13 years 11 months ago
Reflections on UNIX Vulnerabilities
The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded it...
Matt Bishop