Sciweavers

197 search results - page 9 / 40
» Feasibility of Multi-Protocol Attacks
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Toward generic image dewatermarking?
A significant effort has been put in designing watermarking algorithms during the last decade. But today, the watermarking community needs some advanced attacks and fair benchmark...
Christian Rey, Gabriela Csurka, Gwenaël J. Do...
ICNP
2006
IEEE
14 years 1 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song
ICCCN
2007
IEEE
14 years 1 months ago
Multi-channel Jamming Attacks using Cognitive Radios
To improve spectrum efficiency, future wireless devices will use cognitive radios to dynamically access spectrum. While offering great flexibility and softwarereconfigurability...
Ashwin Sampath, Hui Dai, Haitao Zheng, Ben Y. Zhao
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 22 days ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart