Sciweavers

113 search results - page 13 / 23
» Attacks on physical-layer identification
Sort
View
BMCBI
2007
106views more  BMCBI 2007»
13 years 8 months ago
In silico identification of NF-kappaB-regulated genes in pancreatic beta-cells
Background: Pancreatic beta-cells are the target of an autoimmune attack in type 1 diabetes mellitus (T1DM). This is mediated in part by cytokines, such as interleukin (IL)-1β an...
Najib Naamane, Jacques van Helden, Decio L. Eiziri...
HIP
2005
Springer
124views Cryptology» more  HIP 2005»
14 years 2 months ago
How Much Assurance Does a PIN Provide?
Abstract. We would like to quantify the assurance contained in an authentication secret. For instance, how much assurance does a customer convey to a bank by revealing that his Per...
Jon Louis Bentley, Colin Mallows
PERCOM
2007
ACM
14 years 8 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
JSAC
2006
105views more  JSAC 2006»
13 years 8 months ago
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
Today's Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has recently been proposed ...
Abraham Yaar, Adrian Perrig, Dawn Song
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 8 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke