Sciweavers

373 search results - page 12 / 75
» Two Attacks on Reduced IDEA
Sort
View
CORR
2010
Springer
104views Education» more  CORR 2010»
13 years 7 months ago
Distributed Successive Approximation Coding using Broadcast Advantage: The Two-Encoder Case
Abstract-- Traditional distributed source coding rarely considers the possible link between separate encoders. However, the broadcast nature of wireless communication in sensor net...
Zichong Chen, Guillermo Barrenetxea, Martin Vetter...
IEEEARES
2009
IEEE
14 years 2 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...
INDOCRYPT
2005
Springer
14 years 1 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
INFOCOM
2005
IEEE
14 years 1 months ago
Intentional dropping: a novel scheme for SYN flooding mitigation
— This paper presents a novel scheme to mitigate the effect of SYN flooding attacks. The scheme, called intentional dropping based filtering, is based on the observation of cl...
Basheer Al-Duwairi, G. Manimaran
IEEEIAS
2009
IEEE
13 years 5 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian