Sciweavers

113 search results - page 7 / 23
» Attacks on physical-layer identification
Sort
View
ICASSP
2008
IEEE
14 years 3 months ago
Is voice transformation a threat to speaker identification?
With the development of voice transformation and speech synthesis technologies, speaker identification systems are likely to face attacks from imposters who use voice transformed ...
Qin Jin, Arthur R. Toth, Alan W. Black, Tanja Schu...
EJWCN
2010
237views more  EJWCN 2010»
13 years 3 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
WWIC
2010
Springer
278views Communications» more  WWIC 2010»
14 years 16 days ago
Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...
ISW
2010
Springer
13 years 6 months ago
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the p...
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, H...
MEDIAFORENSICS
2010
13 years 10 months ago
Sensor noise camera identification: countering counter-forensics
In camera identification using sensor noise, the camera that took a given image can be determined with high certainty by establishing the presence of the camera's sensor fing...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen