Remote algorithmic complexity attacks against randomized hash tables
Year of publication: |
2008
|
---|---|
Authors: | Bar-Josef, Noa ; Wool, Avishai |
Published in: |
E-business and telecommunications : 4th international conference ; revised selected papers. - Berlin : Springer, ISBN 978-3-540-88652-5. - 2008, p. 162-174
|
Subject: | Electronic Commerce | E-commerce | Zutrittskontrolle | User access control | Datensicherheit | Data security | Computerunterstützung | Computerized method | Algorithmus | Algorithm | Simulation | Theorie | Theory |
-
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim, (2008)
-
Kiyomoto, Shinsaku, (2008)
-
A secure and efficient payment protocol based on ElGamal cryptographic algorithms
Popescu, Constantin, (2018)
- More ...
-
Computational experience with approximation algorithms for the set covering problem
Grossman, Tal, (1997)
-
On the Economics of Multicasting
Shavitt, Yuval, (2004)
-
On the Economics of Multicasting
Shavitt, Yuval, (2004)
- More ...