Sciweavers

5234 search results - page 118 / 1047
» Simulation of Computer Network Attacks
Sort
View
IJNSEC
2008
166views more  IJNSEC 2008»
13 years 9 months ago
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper,...
Zine-Eddine Abid, Wei Wang
NDSS
2002
IEEE
14 years 2 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
AC
2004
Springer
13 years 9 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
14 years 2 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
TOG
2008
111views more  TOG 2008»
13 years 9 months ago
Clone attack! Perception of crowd variety
When simulating large crowds, it is inevitable that the models and motions of many virtual characters will be cloned. However, the perceptual impact of this trade-off has never be...
Rachel McDonnell, Michéal Larkin, Simon Dob...