Sciweavers

1369 search results - page 137 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 10 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
123
Voted
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
15 years 10 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
CCS
2007
ACM
15 years 10 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
CALC
2001
Springer
171views Cryptology» more  CALC 2001»
15 years 8 months ago
Approximate Integer Common Divisors
We show that recent results of Coppersmith, Boneh, Durfee and Howgrave-Graham actually apply in the more general setting of (partially) approximate common divisors. This leads us t...
Nick Howgrave-Graham
CCS
2008
ACM
15 years 6 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...