Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the ne...
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...