A useful means of classifying security attacks, used both in X.800 and RFC 2828, is in terms ofpassive attacksandactive attacks. A passive attack attempts to learn or make use of information from the system but does not affect system resources. An active attack attempts to alter system resou...
PVV Oorschot - 《Information Security & Cryptography》 被引量: 0发表: 2021年 Network security defense model based on firewall and IPS In this paper, the architecture design of intrusion prevention system which integrates audit and network defense functions is proposed. The system optimizes ... ZX...
Hence three keys are used in cryptography that is public key, secret key and private key [1]. Cryptanalyst studies the algorithm, finding its pattern and weakness while cryptographer set to try to secure the message by applying the algorithm. Various technologies are used to secure the message...
Cloud data are attacked by insiders as well as outsiders in different ways. This paper describes the different types of attacks on cloud data and also presents what are cryptography solutions are available to protect the data from the different attacks. Security is addressed by different parameters...
Satoshi Nakamoto [1] proposed the concept of blockchain in 2008 and created the origin blockchain of Bitcoin in 2009. Blockchain is essentially a P2P distributed ledger, which is integrated by various technologies, such as P2P network, consensus mechanism, cryptography etc. Blockchain has shown ...
With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have...
In this tutorial, we will learn about the security goals which are the main aim and reason behind the cryptography, what these goals are that are to be met while ensuring data security. Also, we would be studying the principles of security. ...
- Applied Cryptography & Network Security 被引量: 0发表: 2010年 Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption Summary: We describe several attacks against the PKCS\\#1 v1.5 key transport mechanism of XML Encryption. Our attacks allow to recover the secret key ...
Network coding has attracted the attention of many researchers in security and cryptography. In this paper, a well-known attack selective forwarding attack will be studied in network coding systems. While most of the works have been dedicated to the countermeasures against pollution attacks where an...
In: Sion, R. eds. (2010) Financial Cryptography and Data Security. Springer, Heidelberg, pp. 20-34 CrossRef Cohen, E.: Taps: A first-order verifier for cryptographic protocols. In: 13th IEEE Computer Security Foundations Workshop (CSFW 2000). IEEE Computer Society Press, Los Alamitos (...