Sciweavers

29 search results - page 4 / 6
» The Power of the Defender
Sort
View
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
13 years 10 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
EHEALTH
2008
188views Healthcare» more  EHEALTH 2008»
13 years 8 months ago
Persuasive Mobile Health Applications
With many industrialized societies bearing the cost of an increasingly sedentary lifestyle on the health of their populations there is a need to find new ways of encouraging physic...
Carlos Garcia Wylie, Paul Coulton
ISSA
2008
13 years 8 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
USITS
2003
13 years 8 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
CCR
2010
133views more  CCR 2010»
13 years 6 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...