Defacement Detection with Passive Adversaries

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Web Defacement Detection Technique

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data like personal information, credit card number, etc. This rapid proliferation of website has also spawned new threat to business and other organizations. Hackers are developing new techniques to deface website and steal the data from Web server. On...

متن کامل

Computationally Sound Implementations of Equational Theories Against Passive Adversaries

In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In pa...

متن کامل

Security of ECQV-Certified ECDSA Against Passive Adversaries

We show that the elliptic curve Qu-Vanstone implicit certificate scheme (ECQV), when composed with the Elliptic Curve Digital Signature Algorithm (ECDSA), is secure against passive adversaries under the combined assumption of the random oracle model and the generic group model. In contrast, we detail an attack on the composition of another implicit certificate scheme, proposed by Pintsov and Va...

متن کامل

Detection Games Under Fully Active Adversaries

We study a binary hypothesis testing problem in which a defender must decide whether or not a test sequence has been drawn from a given memoryless source P0 whereas, an attacker strives to impede the correct detection. With respect to previous works, the adversarial setup addressed in this paper considers an attacker who is active under both hypotheses, namely, a fully active attacker, as oppos...

متن کامل

Error Detection Techniques Against Strong Adversaries

“Side channel” attacks (SCA) pose a serious threat on many cryptographic devices and are shown to be effective on many existing security algorithms which are in the black box model considered to be secure. These attacks are based on the key idea of recovering secret information using implementation specific side-channels. Especially active fault injection attacks are very effective in terms of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Algorithms

سال: 2019

ISSN: 1999-4893

DOI: 10.3390/a12080150