Sciweavers

268 search results - page 32 / 54
» A Statistical Attack on RC6
Sort
View
RAID
2010
Springer
13 years 5 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
PET
2012
Springer
11 years 9 months ago
Exploring the Ecosystem of Referrer-Anonymizing Services
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
GLOBECOM
2008
IEEE
14 years 1 months ago
Inferring Internet Worm Temporal Characteristics
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
ICITA
2005
IEEE
14 years 1 months ago
Visual Steganalysis of LSB-Encoded Natural Images
Contemporary steganographic systems encode hidden messages inside the least significant bit layers of colour natural images. The presence of these messages is difficult to detect ...
Paul Andrew Watters, Frances Martin, H. Steffen St...
ASIACRYPT
2000
Springer
13 years 11 months ago
Power Analysis, What Is Now Possible...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Mehdi-Laurent Akkar, Régis Bevan, Paul Disc...