Sciweavers

80 search results - page 9 / 16
» Attacking and fixing PKCS
Sort
View
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
CCS
2009
ACM
14 years 1 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
ICISC
2004
112views Cryptology» more  ICISC 2004»
13 years 11 months ago
Improvement on Ha-Moon Randomized Exponentiation Algorithm
Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. Howe...
Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, Jae...
TROB
2008
113views more  TROB 2008»
13 years 9 months ago
An Optimality Principle Governing Human Walking
Abstract--In this paper, we investigate different possible strategies underlying the formation of human locomotor trajectories in goal-directed walking. Seven subjects were asked t...
Gustavo Arechavaleta, Jean-Paul Laumond, Halim Hic...
MUE
2007
IEEE
150views Multimedia» more  MUE 2007»
14 years 4 months ago
Security Issues in Wireless Mesh Networks
Wireless Mesh Network (WMN) is a new wireless networking paradigm. Unlike traditional wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each ...
Muhammad Shoaib Siddiqui, Choong Seon