Sciweavers

525 search results - page 75 / 105
» The Davies-Murphy Power Attack
Sort
View
CCS
2005
ACM
14 years 3 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
ICALP
2005
Springer
14 years 3 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
IWDW
2005
Springer
14 years 3 months ago
Performance Study on Multimedia Fingerprinting Employing Traceability Codes
Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Collusion attack is ...
Shan He, Min Wu
KES
2005
Springer
14 years 3 months ago
Zero-Based Code Modulation Technique for Digital Video Fingerprinting
Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but sim...
In Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-K...
ACSAC
2009
IEEE
14 years 3 months ago
A Guided Tour Puzzle for Denial of Service Prevention
Abstract—Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a l...
Mehmud Abliz, Taieb Znati