• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,334
Next 10 →

� Active Attacks

by Claudia Díaz, Prof Vandewalle , 2005
"... ..."
Abstract - Add to MetaCart
Abstract not found

On Active Attacks to Kerberos Telnet

by Simon Josefsson, Rsa Laboratories , 2001
"... We present a well-known and well-documented weakness against active attacks in the Telnet Authentication and Encryption Protocol framework, and discuss the consequences for Kerberos (version 4 and 5) Telnet. We recognize that the weakness can ultimately be used by a active attacker to fool Kerberos ..."
Abstract - Add to MetaCart
We present a well-known and well-documented weakness against active attacks in the Telnet Authentication and Encryption Protocol framework, and discuss the consequences for Kerberos (version 4 and 5) Telnet. We recognize that the weakness can ultimately be used by a active attacker to fool Kerberos

Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks

by Steven M. Bellovin, Michael Merritt - IEEE SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY , 1992
"... Classical cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. We introduce a novel combination of asymmetric (public-key) and symmetric (secret-key) cryptography that allow two parties sharing a common password to exchange confidential and authenti ..."
Abstract - Cited by 436 (5 self) - Add to MetaCart
and authenticated information over an insecure network. These protocols are secure against active attacks, and have the property that the password is protected against off-line "dictionary" attacks. There are a number of other useful applications as well, including secure public telephones.

SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks

by Yih-Chun Hu, David B. Johnson, Adrian Perrig , 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract - Cited by 534 (8 self) - Add to MetaCart
operations in the protocol. SEAD performs well over the range of scenarios we tested, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node, even in spite of any active attackers or compromised nodes in the network.

Oceanstore: An architecture for global-scale persistent storage

by John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, Ben Zhao , 2000
"... OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted servers, data is protected through redundancy and cryptographic techniques. To improve performance, data is allowed to be cac ..."
Abstract - Cited by 1149 (32 self) - Add to MetaCart
to be cached anywhere, anytime. Additionally, monitoring of usage patterns allows adaptation to regional outages and denial of service attacks; monitoring also enhances performance through pro-active movement of data. A prototype implementation is currently under development. 1

Public-key steganography with active attacks

by Michael Backes, Christian Cachin - Second Theory of Cryptography Conference — TCC 2005, volume 3378 of Lecture Notes in Computer Science , 2005
"... Abstract. A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CCA) and a relaxation called steganographic security against publicly-detectable replayable adaptive chosen-cover ..."
Abstract - Cited by 38 (3 self) - Add to MetaCart
Abstract. A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CCA) and a relaxation called steganographic security against publicly-detectable replayable adaptive chosen

Inferring Internet Denial-of-Service Activity

by David Moore, Geoffrey Voelker, Stefan Savage - In Proceedings of the 10th Usenix Security Symposium , 2001
"... In this paper, we seek to answer a simple question: "How prevalent are denial-of-service attacks in the Internet today?". Our motivation is to understand quantitatively the nature of the current threat as well as to enable longerterm analyses of trends and recurring patterns of attacks. We ..."
Abstract - Cited by 456 (12 self) - Add to MetaCart
. We present a new technique, called "backscatter analysis", that provides an estimate of worldwide denial-of-service activity. We use this approach on three week-long datasets to assess the number, duration and focus of attacks, and to characterize their behavior. During this period, we

Aging: a theory based on free radical and radiation chemistry

by Denham Harman, Ph. D - J Gerontol , 1956
"... The phenomenon of growth, decline and death-aging-has been the source of consider-able speculation (1, 8, 10). This cycle seems to be a more or less direct function of the meta-bolic rate and this in turn depends on the species (animal or plant) on which are super-imposed the factors of heredity and ..."
Abstract - Cited by 637 (2 self) - Add to MetaCart
and the effects of the stresses and strains of life-which alter the metabolic activity. The universality of this phenomenon sug-gests that the reactions which cause it are basic-ally the same in all living things. Viewing this process in the light of present day free radical and radiation chemistry

Active Attacks in Abstract Non-Interference

by Isabella Mastroeni
"... Abstract. In this paper we define a notion of abstract active attacker, which allows us to define a notion of abstract non-interference where the attackers can be active, exactly as it has be done for defining robust declassification [13]. Moreover, we define a notion of abstract integrity following ..."
Abstract - Add to MetaCart
Abstract. In this paper we define a notion of abstract active attacker, which allows us to define a notion of abstract non-interference where the attackers can be active, exactly as it has be done for defining robust declassification [13]. Moreover, we define a notion of abstract integrity

An active attack against HB+ – a provable secure lightweight authentication protocol

by Henri Gilbert, Matthew Robshaw, Hervé Sibert, Issy Les Moulineaux
"... Abstract Much research has focused on providing RFID tags with lightweight cryptographic functionality. The HB + authentication protocol was recently proposed [1] and claimed to be secure against both passive and active attacks. In this note we propose a linear-time active attack against HB +. ..."
Abstract - Cited by 74 (3 self) - Add to MetaCart
Abstract Much research has focused on providing RFID tags with lightweight cryptographic functionality. The HB + authentication protocol was recently proposed [1] and claimed to be secure against both passive and active attacks. In this note we propose a linear-time active attack against HB +.
Next 10 →
Results 1 - 10 of 6,334
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University