Sciweavers

828 search results - page 26 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
CODES
2007
IEEE
15 years 8 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
CSFW
2000
IEEE
15 years 6 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
JCIT
2007
142views more  JCIT 2007»
15 years 2 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
AINA
2006
IEEE
15 years 8 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
GLOBECOM
2006
IEEE
15 years 8 months ago
Performance Analysis of Distributed Source Coding and Packet Aggregation in Wireless Sensor Networks
— In this paper, we propose a theoretical setup for evaluation of energy efficiency of wireless sensor networks (WSNs) with distributed source coding (DSC) algorithms and packet...
L. Di Paolo, Carlo Fischione, Carlo Graziosi, Fort...