Sciweavers

163 search results - page 14 / 33
» WiFi attack vectors
Sort
View
JEI
2007
88views more  JEI 2007»
13 years 9 months ago
Wavelet-based fragile watermarking scheme for image authentication
In this work, we propose a novel fragile watermarking scheme in wavelet transform domain, which is sensitive to all kinds of manipulations and has the ability to localize the tamp...
Chang-Tsun Li, Huayin Si
SICHERHEIT
2010
13 years 7 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
HAIS
2010
Springer
14 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
INFOCOM
2009
IEEE
14 years 4 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
ASIACRYPT
2009
Springer
14 years 4 months ago
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functi...
Eric Brier, Shahram Khazaei, Willi Meier, Thomas P...