نتایج جستجو برای: attack construction

تعداد نتایج: 287518  

2006
Willy Susilo Yi Mu

Phishing emails are one of today’s most common and costly forms of digital identity theft. They are now very convincing that even experts cannot tell what is and is not genuine. In a phishing attack, victims are lured by an official looking email to a fraudulent website that appears to be that of a legitimate service provider. Such attacks can be mitigated with digitally-signed emails. Unfortun...

Journal: :نشریه پرستاری ایران 0
سلوا نیکپور nikpoor, s

most of the patients imagine that chest pain is not sign of heart attack. but, may be pain is not sign of heart attack. pain source may be from pulmonary, stomach, intestinal, psychologic or musculoskeletal problems. from these factors, when two or more factors combine to each other, similar signs are happen. all of these factors harden diagnosis of chest pain reason. only with separation of pe...

Ahmet Cagdas Acara Mehtap Bulut, Muhittin İşsever Mustafa Bolatkale, Ulaş Karaoğlu

 Statins are commonly used drugs in the treatment of hyperlipidemia (HL), despite some undesirable side effects. These range from mild symptoms such as myopathy, muscle weakness and myalgia to severe muscle weakness associated with chronic myopathy and acute renal failure (ARF) as a result of rhabdomyolysis. The most serious and deadly side effect of statins is rhabdomyolysis. The case presente...

2010
François-Xavier Standaert

This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementation weaknesses that can be exploited in a key-recovery attack. We first show that in our experimental context (8-bit device, Hamming weight leakages, Gaussian noise), a successful attack against the investigated stre...

2007
Alex Biryukov Andrey Bogdanov Dmitry Khovratovich Timo Kasper

Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its implementation (namely that keyed parts are perfectly protected against side-channel attacks but bulk hashing rounds are not) one can efficiently attack this function. We propose a side-channel collision attack on this...

2006
Eli Biham Orr Dunkelman

For years hash functions were built from compression functions using the Merkle-Damg̊ard construction. Recently, several flaws in this construction were identified, allowing for pre-image attacks and second preimage attacks on such hash functions even when the underlying compression functions are secure. In this paper we propose the HAsh Iterative FrAmework (HAIFA). Our framework can fix many of...

Journal: :Environmental Modelling and Software 2014
Rubén Béjar Francisco J. López-Pellicer Javier Nogueras-Iso F. Javier Zarazaga-Soria Pedro R. Muro-Medrano

An efficient access to the contents provided through OGC web services, widely used in environmental information systems, is usually achieved by means of caching strategies. Service-owners may be interested in expressing the conditions required to allow for this. If these conditions are expressed in a machine-readable way, automatic harvesters can be programmed to follow them when caching those ...

2017
Md Nahid Hossain Sadegh M. Milajerdi Junao Wang Birhanu Eshete Rigel Gjomemo R. Sekar Scott Stoller V. N. Venkatakrishnan

We present an approach and system for real-time reconstruction of attack scenarios on an enterprise host. To meet the scalability and real-time needs of the problem, we develop a platform-neutral, main-memory based, dependency graph abstraction of audit-log data. We then present efficient, tag-based techniques for attack detection and reconstruction, including source identification and impact a...

Journal: :IJCNS 2009
Slim Rekhis Jihène Krichène Noureddine Boudriga

Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for Digital Forensic in Networking, called DigForNet, which is useful to analyze security incidents and explain the steps taken by the attackers. DigForNet combines intrusion response...

Journal: :IACR Cryptology ePrint Archive 2015
Jung Hee Cheon Changmin Lee Hansol Ryu

Multilinear maps have many cryptographic applications. The first candidate construction of multilinear maps was proposed by Garg, Gentry, and Halevi (GGH13) in 2013, and a bit later another candidate was suggested by Coron, Lepoint, and Tibouchi (CLT13) over the integers. However, both of them turned out to be insecure from so-called zeroizing attack (HJ15, CHL15). As a fix of CLT13, Coron, Lep...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید