Learn More
This paper presents a dangerous low-cost traffic analysis attack in packet-based networks, such as the Internet. The attack is mountable in any scenario where a shared routing resource exists among users. A real-world attack successfully compromised the privacy of a user without requiring significant resources in terms of access, memory, or computational(More)
This paper presents a nefarious low-cost traffic analysis attack in packet-based networks, such as the Internet. The attack is mountable in any scenario where a shared routing resource exists among users. A real-world attack successfully compromised the privacy of a user without requiring significant resources in terms of access, memory, or computational(More)
Today more and more private, sensitive and business data is stored in the cloud. Thus the question of secure user authentication is becoming increasingly important. Until now alphanumeric passwords like usernames or PINs are mainly used to authenticate a user. But this type of authentication is vulnerable to shoulder-surfing the process of looking over(More)
  • 1