Sciweavers

113 search results - page 5 / 23
» Attacks on physical-layer identification
Sort
View
EUROCRYPT
2001
Springer
14 years 1 months ago
Identification Protocols Secure against Reset Attacks
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...
IJCSA
2008
60views more  IJCSA 2008»
13 years 8 months ago
Traffic Analysis Based Identification of Attacks
Dima Novikov, Roman V. Yampolskiy, Leon Reznik
IEICET
2007
46views more  IEICET 2007»
13 years 8 months ago
Identification of Attack Nodes from Traffic Matrix Estimation
Yuichi Ohsita, Shingo Ata, Masayuki Murata
TIFS
2011
253views Education» more  TIFS 2011»
13 years 3 months ago
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
—Sensor photo-response non-uniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including digital-camera ballistics in which an image is ...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen