Sciweavers

197 search results - page 20 / 40
» Feasibility of Multi-Protocol Attacks
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
ICIP
2002
IEEE
14 years 9 months ago
On the security of an image encryption method
The security of digital images attracts much attention recently, and many different image encryption methods have been proposed. In 1999, J.-C. Yen and J.-I. Guo proposed a novel ...
Shujun Li, Xuan Zheng
ISCC
2006
IEEE
14 years 1 months ago
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation
The difficulties of achieving an inter-domain traceback architecture come from the issues of overcoming network operation boundaries, especially the leakage of sensitive informat...
Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyam...
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
13 years 12 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
AINA
2005
IEEE
13 years 9 months ago
Estimations on the Security Aspect of Brand's Electronic Cash Scheme
In Crypto’93, Stefan Brands [1] proposed a very efficient off-line electronic cash. Then, the subsequent researchers such as Ernest Foo [2,3], WK Yip [4] and Yiannis [5] develop...
Chang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman