Sciweavers

948 search results - page 137 / 190
» Attacking cryptographic schemes based on
Sort
View
SP
1989
IEEE
14 years 1 days ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
IPSN
2003
Springer
14 years 1 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
SSWMC
2004
13 years 9 months ago
Statistical amplitude scale estimation for quantization-based watermarking
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore the scaling factor has to be accounted for either at the encoder, or at the decoder, prior t...
Ivo D. Shterev, Reginald L. Lagendijk, Richard Heu...
MOBIHOC
2009
ACM
14 years 8 months ago
Optimal monitoring in multi-channel multi-radio wireless mesh networks
Wireless mesh networks (WMN) are finding increasing usage in city-wide deployments for providing network connectivity. Mesh routers in WMNs typically use multiple wireless channel...
Dong-Hoon Shin, Saurabh Bagchi
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 2 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang