Sciweavers

113 search results - page 5 / 23
» Attacks on physical-layer identification
Sort
View
120
Voted
EUROCRYPT
2001
Springer
15 years 9 months ago
Identification Protocols Secure against Reset Attacks
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...
IJCSA
2008
60views more  IJCSA 2008»
15 years 4 months ago
Traffic Analysis Based Identification of Attacks
Dima Novikov, Roman V. Yampolskiy, Leon Reznik
IEICET
2007
46views more  IEICET 2007»
15 years 4 months ago
Identification of Attack Nodes from Traffic Matrix Estimation
Yuichi Ohsita, Shingo Ata, Masayuki Murata
TIFS
2011
253views Education» more  TIFS 2011»
14 years 11 months ago
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
—Sensor photo-response non-uniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including digital-camera ballistics in which an image is ...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen