• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 6,334
Next 10 →

From a Trickle to a Flood: Active Attacks on Several Mix Types

by Andrei Serjantov, Roger Dingledine, Paul Syverson - In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578 , 2002
"... The literature contains a variety of different mixes, some of which have been used in deployed anonymity systems. We explore their anonymity and message delay properties, and show how to mount active attacks against them by altering the traffic between the mixes. ..."
Abstract - Cited by 94 (13 self) - Add to MetaCart
The literature contains a variety of different mixes, some of which have been used in deployed anonymity systems. We explore their anonymity and message delay properties, and show how to mount active attacks against them by altering the traffic between the mixes.

The Computational Brain.

by P S Churchland , T J Sejnowski , Bruce Bridgeman , 1994
"... Keywords: reductionism, neural networks, distributed coding, Karl Pribram, computational neuroscience, receptive field 1.1 The broad goal of this book, expressed at the start, is ``to understand how neurons give rise to a mental life.'' A mental reductionism is assumed in this seductively ..."
Abstract - Cited by 450 (7 self) - Add to MetaCart
in this seductively simple formulation. Indeed, the book represents reductionism at its best, as the authors guide the reader through the many intermediate levels that link neurons with mental life. In so doing they attack a problem that has persisted for some decades in the neurosciences, since the development

A simple active attack against tcp

by Laurent Joncheray, Laurent Joncheray - In SSYM’95: Proceedings of the 5th conference on USENIX UNIX Security Symposium , 1995
"... This paper describes an active attackagainst the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection o ered by suchasystem as a one-time password [SKEY] or ticketing authentication [Kerberos]. The TCP ..."
Abstract - Cited by 70 (0 self) - Add to MetaCart
This paper describes an active attackagainst the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection o ered by suchasystem as a one-time password [SKEY] or ticketing authentication [Kerberos]. The TCP

Survey of various Active Attacks in MANETS

by Dr Meenabharti Shaveta , Dr Rani , Paramjeet Singh , Bathinda~punjab Bathinda~punjab Bathinda~punjab
"... ..."
Abstract - Add to MetaCart
Abstract not found

Active Attacks 1 Running head: ACTIVE ATTACKS ON COMPUTER SYSTEMS Active Attacks on Computer Systems

by Chris Collins , 2006
"... Introduction. In this paper I outline some of the most frequent attacks used against computer systems. Firstly we introduce the goals of computer security. Then we show how these can be affected by both external and internal threats. Goals of Computer Security ..."
Abstract - Add to MetaCart
Introduction. In this paper I outline some of the most frequent attacks used against computer systems. Firstly we introduce the goals of computer security. Then we show how these can be affected by both external and internal threats. Goals of Computer Security

Obtaining Non-repudiable Proof of Active Attacks in DSR

by Kulasekaran A. Sivakumar, Mahalingam Ramkumar
"... Abstract—Many secure MANET routing protocols have been proposed in the literature which employ non repudiable cryptographic authentication. However, they have not been explicitly designed to provide non repudiable proof of active attacks (NPAA). For example, Ariadne with digital signatures (ADS) is ..."
Abstract - Add to MetaCart
Abstract—Many secure MANET routing protocols have been proposed in the literature which employ non repudiable cryptographic authentication. However, they have not been explicitly designed to provide non repudiable proof of active attacks (NPAA). For example, Ariadne with digital signatures (ADS

Unconditional Sender and Recipient Untraceability in spite of Active Attacks

by Michael Waidner , 1989
"... . A protocol is described which allows to send and receive messages anonymously using an arbitrary communication network, and it is proved to be unconditionally secure. This improves a result by DAVID CHAUM: The DC-net guarantees the same, but on the assumption of a reliable broadcast network. Since ..."
Abstract - Cited by 49 (1 self) - Add to MetaCart
. A protocol is described which allows to send and receive messages anonymously using an arbitrary communication network, and it is proved to be unconditionally secure. This improves a result by DAVID CHAUM: The DC-net guarantees the same, but on the assumption of a reliable broadcast network. Since unconditionally secure Byzantine Agreement cannot be achieved, such a reliable broadcast network cannot be realized by algorithmic means. The solution proposed here, the DC + -net, uses the DC-net, but replaces the reliable broadcast network by a fail-stop one. By choosing the keys necessary for the DC-net dependently on the previously broadcast messages, the fail-stop broadcast can be achieved unconditionally secure and without increasing the complexity of the DC-net significantly, using an arbitrary communication network. Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General --- Security and protection, E.3 [Data Encryption], F.2.1 [Analysis of Algorithms...

Silicon-level Solutions to Counteract Passive and Active Attacks

by Sylvain Guilley, Laurent Sauvage, Jean-luc Danger, Nidhal Selmane, Renaud Pacalet
"... This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technol-ogy by the authors with the help of STMicroelectronics. The purpose of these prototype circuits is to experience with the published “implementation-level ” attacks (SPA, DPA, EMA, templates, ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
-measures”, that are meant to resist both passive and active attacks. This study started four years ago with TIMA (Grenoble), in the framework of the project MARS [31]. We highlight some research direc-tions towards dependable and cost-effective dual counter-measures.

A weakest precondition approach to active attacks analysis

by Musard Balliu, Isabella Mastroeni
"... Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in language-based security. The notion of robustness asserts that an active attacker, ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted environments still remains an open problem in language-based security. The notion of robustness asserts that an active attacker

Evaluate the Effect of Man in Middle Attack (Active Attack) on Wireless LAN 1

by Upsana Garg, Monica Goyal, Nancy Bansal, Anand Mittal
"... Wireless LANs (WLAN) introduce the concept of complete mobility provided by air travel; communication is no longer limited to the infrastructure of wires. This provides new opportunities and challenges. This very air-borne nature of WLANs opens it to intruders and attacks that can come from any dire ..."
Abstract - Add to MetaCart
direction. WLAN traffic travels over radio waves that cannot be constrained by the walls of a building. As a result of this, intruders and would-be hackers can potentially access the network from the parking lot or across the street. In this paper, we have discussed about Active attacks on WLANs
Next 10 →
Results 11 - 20 of 6,334
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University