نتایج جستجو برای: malicious but passive key generation center attack

تعداد نتایج: 3071153  

2014
Zied Trifa Maher Khemakhem

Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...

Journal: :IACR Cryptology ePrint Archive 2017
Jintai Ding Scott R. Fluhrer Saraswathy RV

Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key reuse has already been pointed out in previous work. The Signal leakage attack relies on changes in the signal sent by the responder reusing his key, in a sequence of key exchange sessions initiate...

2000
Christian S. Collberg Clark Thomborson Christian Collberg

We identify three types of attack on the intellectual property contained in software, and three corresponding technical defenses. A potent defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is watermarking, a process that makes it possible to determine the origin of software. A defense agains...

2004
Jinhai Wu Bin B. Zhu Shipeng Li Fuzong Lin

The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been reported recently. In this paper, we propose two new attacks that can compromise the SARI system. The first attack is called a histogram attack which modifies DCT coefficients yet maintains the same relationship between an...

Journal: :Mathematics 2022

Internet of Things (IoT) allows the integration physical world with network devices for proper privacy and security in a healthcare system. IoT system is vulnerable to spoofing attacks that can easily represent themselves as legal entity network. It passive attack access Medium Access Control address some valid users continue malicious activities. In this paper, an algorithm proposed detecting ...

2010
Moinuddin K. Qureshi Andre Seznec Luis A. Lastras Michele M. Franceschini

Phase Change Memory (PCM) may become a viable alternative for the design of main memory systems in the next few years. However PCM suffers from limited write endurance. Therefore future adoption of PCM as a technology for main memory will depend on the availability of practical solutions for wear leveling that avoids uneven usage especially in the presence of potentially malicious users. First ...

2015
Rameshwari Malik Pramod Kumar John Saxon Keith Harrison Chris I. Dalton Monica Nicoli Stefano Savazzi Francesca Carminati Michele Riva

Cloud computing visualize as the next generation computing technique for Information technology due to advantages provided by this technology. Cloud computing solutions are scalable, advanced and low cost. Its nature is distributed as cloud, it is indefensible to a large category of attacks are very frequent. Security is major challenge in cloud computing . This paper proposed the creation of F...

Journal: :Security and Communication Networks 2011
Huei-Ru Tseng Rong-Hong Jan Wuu Yang

User authentication is a critical part of security, along with confidentiality and integrity, for computer systems that allow legitimate users remote access over an open communication network. Recently, user authentication for wireless sensor networks (WSNs) has received considerable attention. We propose a robust user authentication scheme for WSNs. The scheme is based on elliptic-curve crypto...

2011
Lalindra De Silva Ravindra Aditya Varma Raghav Aggarwal

Network intrusion detection is a problem that’s hardly being solved completely. Firewalls and other existing solutions do provide some resistance to the wide variety of attack types that can occur, but they suffer the drawback of not being able to generalize well into unseen attack types. Through this report, we propose a framework for addressing the problem of network intrusion by extracting i...

2012
Chengjun Wang Baokang Zhao Wanrong Yu Chunqing Wu Zhenghu Gong

In Delay-Tolerant Network(DTN), certain malicious node might generate congestion in attack to reduce the overall performance of the whole network, especially the target of message successful delivery ratio. In this paper, a novel Nash equilibrium based congestion control routing algorithm with the function of security defense (NESD) is proposed. In the process of message delivery, node can use ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید