Attack model

Results: 101



#Item
21Currency crisis / Exchange rate / Fixed exchange rate / Euro / Speculative / Monetary policy / Balance of payments / Economic model / Economics / International economics / Speculative attack

A Regime Switching Approach to Studying Speculative Attacks: A Focus on European Monetary System Crises Maria Soledad Martinez Peria* Development Research Group World Bank

Add to Reading List

Source URL: www-wds.worldbank.org

Language: English - Date: 2004-11-17 17:21:09
22Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / UDP flood attack / SYN flood / Firewall / Traffic generation model / Denial-of-service attacks / Computer network security / Cyberwarfare

DDoS Benchmarks and Experimenter’s Workbench for the DETER Testbed Jelena Mirkovic Songjie Wei University of Delaware

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2007-08-23 18:34:40
23Public-key cryptography / Communications protocol / Advantage / Peer-to-peer / Side channel attack / Cryptography / Cryptographic protocols / Random oracle

A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wena,b,1 , Libin Wanga,b,2 , Jiaxin Panc,3 a b

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 19:15:30
24Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 23:03:41
25Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
26Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:59:23
27RSA / Adversary / Cryptographic primitive / Cryptography / Public-key cryptography / Side channel attack

SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-23 06:54:05
28Trusted computing / Complexity classes / Formal verification / Trusted Execution Technology / Trusted Platform Module / Adversary model / Replay attack / Interrupt / IP / Theoretical computer science / Cryptography / Applied mathematics

Systematic Treatment of Remote Attestation Aurelien Francillon Networking and Security Group Eurecom Instutute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-20 17:27:19
29Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption

Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 08:58:14
30Actor model / Communications protocol / Data transmission / Protocols / MCM / Internet Relay Chat / Channel / IP / Futures and promises / Computing / Information / Data

Position-Verification in Multi-Channel Model Huajun Zhang, Zongyang Zhang and Zhenfu Cao Shanghai Jiao Tong University, Email: Abstract. We propose an efficient collusion-attack-resistant positio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-01 05:20:19
UPDATE