Sciweavers

12183 search results - page 25 / 2437
» Computers under Attacks!
Sort
View
MOBIQUITOUS
2008
IEEE
14 years 4 months ago
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of the...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
CTRSA
2007
Springer
161views Cryptology» more  CTRSA 2007»
14 years 4 months ago
Cache Based Remote Timing Attack on the AES
We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems i...
Onur Aciiçmez, Werner Schindler, Çet...
WECWIS
2005
IEEE
86views ECommerce» more  WECWIS 2005»
14 years 3 months ago
The Evolution of Cooperation under Cheap Pseudonyms
A wide variety of interactions on the Internet are characterized by the availability of cheap pseudonyms, where users can obtain new identities freely or at a low cost. Due to the...
Michal Feldman, John Chuang
ICIP
2001
IEEE
14 years 11 months ago
Geometric hashing techniques for watermarking
In this paper we introduce the idea of using Computer Vision techniques for improving and enhancing watermarking capabilities. Specifically, we incorporate Geometric Hashing techn...
Hagit Zabrodsky Hel-Or, Y. Yitzhaki, Yacov Hel-Or
ICDCS
2006
IEEE
14 years 3 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper