Search Results

1 - 10 of 168 items :

  • correlation attacks x
Clear All
Improving CPA Attack Against DSA and ECDSA

of E-SMART ’01, Springer-Verlag, London, UK, 2001, pp. 200-210. [4] DING, G. L.-CHU, J.-YUAN, L. ZHAO, Q. : Correlation Electromagnetic Analysis for Cryptographic Device, Proc. of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, IEEE Computer Society, Washington, DC, USA, 2009, pp. 388-391. [5] MANGARD, S.-OSWALD, E.-POPP, T. : Power Analysis Attacks - Revealing the Secrets of Smart Cards, Advances in Information Security, Handbook, Springer-Verlag, New York, 2007. [6] MEDWED, M.-OSWALD, M. E

Open access
Tracking Anonymized Bluetooth Devices

). Core Specifications, 2018. [11] Bluetooth Special Interest Group (SIG). Our History, 2018. [12] Britt Cyr, Webb Horn, Daniela Miao, and Michael Specter. Security Analysis of Wearable Fitness Devices (Fitbit). Massachusetts Institute of Technology , pages 1–14, 2014. [13] D.A. Dai Zovi and S.A. Macaulay. Attacking Automatic Wireless Network Selection. In Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005. , volume 2005, pages 365–372. IEEE, 2005. [14] Dino A Dai Zovi. KARMA Attacks

Open access
Guard Placement Attacks on Path Selection Algorithms for Tor

. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. In 28th USENIX Security Symposium , 2019. [21] Aaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, and Paul Syverson. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In ACM Conference on Computer and Communications Security (CCS) , CCS ’13, 2013. [22] Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt. A Critical Evaluation of Website Fingerprinting Attacks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and

Open access
On the Influence of Topological Characteristics on Robustness of Complex Networks

. [10] R. Albert, H. Jeong, and A.-L. Barab´asi, “Error and attack tolerance of complex networks,” Nature, vol. 406, pp. 378-382, 2000. [11] A.-L. Barabáasi, “Scale-free networks: A decade and beyond,” Science, vol. 325, no. 5939, pp. 412-413, 2009. [12] A.-L. Barabáasi, R. Albert, and H. Jeong, “Scalefree characteristics of random networks: The topology of the world-wide web,” Physica A, vol. 281, pp. 69-77, 2000. [13] A.-L. Barabáasi and E. Bonabeau, “Scale-free networks,” Scientific American, vol. 288, pp. 50-59, 2003

Open access
Data-plane Defenses against Routing Attacks on Tor

References [1] I. C. Avramopoulos and J. Rexford. Stealth Probing: Efficient Data- Plane Security for IP Routing. In USENIX Annual Technical Conference (USENIX-ATC), 2006. [2] CAIDA UCSD IPv4 Routed /24 Topology Dataset. http://www.caida.org/data/active/ipv4_routed_24_topology_dataset.xml. [3] D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84-90, 1981. [4] S. P. Chung and A. K. Mok. Allergy Attack against Automatic Signature

Open access
Waterfilling: Balancing the Tor network with maximum diversity

2007) . Springer, June 2007. [29] G. O’Gorman and S. Blott. Improving stream correlation attacks on anonymous networks. In Proceedings of the 2009 ACM symposium on Applied Computing , pages 2024–2028. ACM, 2009. [30] A. Pfitzmann and M. Hansen. Anonymity, unobservability, and pseudonymity: A consolidated proposal for terminology. Draft, July 2000. [31] A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002

Open access
Validity, reliability, and sensitivity to change of the Thai version of the Migraine-Specific Quality of Life Questionnaire version 2.1

completing the first and second questionnaires is displayed in Table 2 . Findings were almost identical including frequency of attacks, average pain duration, average pain severity score, and associated symptoms except headache severity, with a slightly higher score for mild degree in the first questionnaire (73% vs 67%). The concurrent validity of the Thai version of MSQv2.1 as shown in Table 3 had a significant reverse correlation with the migraine characteristics; correlation coefficient ranged from –0.62 to –0.39 except average pain duration and RP, headache

Open access
Direction and Velocity of the Ball in Volleyball Spike Depending on Location on Court

Literature 1. Rokito A.S., Jobe F.W., Pink M.M., Perry J., Brault J. (1998). Electromyography analysis of shoulder function during the volleyball serve and spike. Journal Shoulder Elbow 7, 256-263. DOI: 10.1016/S1058-2746(98)90054-4. 2. Forthome B., Croisier J.L., Ciccarone G., Crielaard J.M., Cloes M. (2005). Factors correlated with volleyball spike velocity. American Journal of Sport Medicine 33, 1513-1519. DOI: 10.1177/0363546505274935. 3. Park S. (2003). Anticipation and acquiring processes of visual cues on a spiker’s attack patterns

Open access
Aspirin responsiveness and 6-month clinical outcome observed in a cohort study of patients with unstable angina pectoris

individuals taking aspirin. We calculated a cut-off based on the mean impedance measured at 6 min in normal individuals, and aspirin resistance was defined as having normal impedance (impedance <10 Ω, the cut-off value) despite regular aspirin therapy. Study end points Primary end points were MACEs, including cardiovascular death, nonfatal myocardial infarction, revascularization, stroke/transient ischemic attack, or worsening UAP that required the patient to be readmitted to hospital. We defined cardiovascular death as death because of acute myocardial infarction

Open access
On Distinguishing Attack Against the Reduced Version of the Cipher Nlsv2

Notes in Comput. Sci., Vol. 1556, Springer, Berlin, 1999, pp. 362-375. [3] CHO, J. Y.-PIERPRZYK, J.: Crossword puzzle attack on NLS , Sel. Areas in Cryptogr. 2006, 1-15, research.ics.tkk.fi/publications/jcho/cpa-nls.pdf. [4] CHO, J. Y.-PIERPRZYK, J.: Linear distinguishing attack on NLS , Project eSTREAM web page, 2006, 1-10, http://www.ecrypt.eu.org/stream/papersdir/2006/018.pdf. [5] CHO, J. Y.-PIERPRZYK, J.: Multiple modular additions and crossword puzzle attack on NLSv2 , Project eSTREAM web page, 2006, 1-19, http

Open access