نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

2010
Phillipa Gill Yashar Ganjali Bernard Wong David Lie

Many applications of IP geolocation can benefit from geolocation that is robust to adversarial clients. These include applications that limit access to online content to a specific geographic region and cloud computing, where some organizations must ensure their virtual machines stay in an appropriate geographic region. This paper studies the applicability of current IP geolocation techniques a...

2013
Min Li Zhiguang Qin Cong Wang

Location-based Services (LBS) have brought the potential threats of mobile users’ sensitive personal information. Privacy-aware in LBS is including location privacy and query privacy. Unfortunately, existing privacy protection algorithms rarely pay attention to both of them. This paper proposes a novel privacy protection method which combines K-anonymity and L-diversity to protect both location...

Journal: :IJISP 2009
Ramakrishna Thurimella William Mitchell

Information has always been very valuable. Computers are entrusted to maintain and process massive amounts of information. This makes them valuable targets to attackers. One of the most devastating forms of attack is when an attacker gains access to the information without the victim even being aware of it. This paper explores some of the means by which this surreptitious access to information ...

2012
Ali Elouafiq Ayoub Khobalatte Wassim Benhallam

Aggressive and Intelligent Self-defensive Network (AISEN) is an open-source distributed solution that aims at deploying a semi-autonomous network, which enables internal attack deception through misguidance and illusion. In fact, instead of simply preventing or stopping the attack as do traditional Intrusion Prevention Systems (IPS), AISEN drives attackers to attack decoy machines, which clone ...

2014
Tao Wang Xiang Cai Rishab Nithyanand Rob Johnson Ian Goldberg

Website fingerprinting attacks allow a local, passive eavesdropper to identify a user’s web activity by leveraging packet sequence information. These attacks break the privacy expected by users of privacy technologies, including low-latency anonymity networks such as Tor. In this paper, we show a new attack that achieves significantly higher accuracy than previous attacks in the same field, fur...

Journal: :IEEE Transactions on Communications 2022

Feature-based physical layer authentication (PLA) schemes, using position-specific channel characteristics as identifying features, can provide lightweight protection against impersonation attacks in overhead-limited applications like e.g., mission-critical and low-latency scenarios. However, with PLA-aware attack strategies, an attacker maximize the probability of successfully impersonating le...

2015
Mandeep Kaur Manish Mahajan

VANETs are the vehicular networks used to connect the vehicles together to share their information with each other in the cluster. The hackers are used to attack VANETs with various means of attacks. Many security techniques are used to mitigate the risks caused by the attacks to cause ill-effects to the traffic movement on the roads. VANETs are also being used for the automatically driven vehi...

Journal: :IACR Cryptology ePrint Archive 2014
Elena Andreeva Andrey Bogdanov Atul Luykx Bart Mennink Nicky Mouha Kan Yasuda

Scenarios in which authenticated encryption schemes output decrypted plaintext before successful verification raise many security issues. These situations are sometimes unavoidable in practice, such as when devices have insufficient memory to store an entire plaintext, or when a decrypted plaintext needs early processing due to real-time requirements. We introduce the first formalization of the...

2016
Takahiro Matsuda Goichiro Hanaoka

In PKC 2014, Dachman-Soled showed a construction of a chosen ciphertext (CCA) secure public key encryption (PKE) scheme based on a PKE scheme which simultaneously satisfies a security property called weak simulatability and (standard model) plaintext awareness (sPA1) in the presence of multiple public keys. It is not well-known if plaintext awareness for the multiple keys setting is equivalent ...

Journal: :IACR Cryptology ePrint Archive 2012
István Vajda

The UC approach of Canetti offers the advantage of stand-alone analysis while keeping security guaranties for arbitrary complex environment. When we implement by this approach first we have to ensure secure instance separation and based on this condition, we are allowed to carry out a stand-alone analysis. In this report we propose three issues related to instance separation in UC-context: We c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید