Sciweavers

66 search results - page 7 / 14
» Attack Model and Detection Scheme for Botnet on 6LoWPAN
Sort
View
WISTP
2010
Springer
14 years 2 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
FDTC
2007
Springer
105views Cryptology» more  FDTC 2007»
14 years 1 months ago
Tate Pairing with Strong Fault Resiliency
We present a novel non-linear error coding framework which incorporates strong adversarial fault detection capabilities into identity based encryption schemes built using Tate pai...
Erdinç Öztürk, Gunnar Gaubatz, Be...
ICASSP
2009
IEEE
14 years 2 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
ICIP
2006
IEEE
14 years 9 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
14 years 1 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang