Sciweavers

337 search results - page 17 / 68
» Statistical Disclosure Attacks
Sort
View
DIMVA
2007
13 years 8 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
IACR
2011
182views more  IACR 2011»
12 years 7 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 7 months ago
An Ad Omnia Approach to Defining and Achieving Private Data Analysis
We briefly survey several privacy compromises in published datasets, some historical and some on paper. An inspection of these suggests that the problem lies with the nature of the...
Cynthia Dwork
AFRICACRYPT
2008
Springer
14 years 1 months ago
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer 0002, Shahram Khazaei, Willi Meier