Sciweavers

2945 search results - page 100 / 589
» Designing and Implementing Malicious Hardware
Sort
View
APCCAS
2006
IEEE
264views Hardware» more  APCCAS 2006»
15 years 10 months ago
FPGA-Based Design of a Pulsed-OFDM System
—An enhancement to the MB-OFDM system, known as Pulsed-OFDM, has been proposed to reduce the complexity and power consumption of the transceiver without sacrificing performance. ...
Kai-Chuan Chang, Gerald E. Sobelman
EH
2005
IEEE
123views Hardware» more  EH 2005»
15 years 10 months ago
Embryonic Machines That Grow, Self-Replicate and Self-Repair
After a reminder about embryonic machines endowed with universal construction and universal computation properties, this paper presents a novel architecture providing additional s...
André Stauffer, Daniel Mange, Gianluca Temp...
ESORICS
2011
Springer
14 years 4 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
CCS
2009
ACM
15 years 11 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
GLOBECOM
2009
IEEE
15 years 2 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu