Sciweavers

1116 search results - page 93 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
IH
2001
Springer
14 years 12 days ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
WISEC
2009
ACM
14 years 2 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
SENSYS
2005
ACM
14 years 1 months ago
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
— In this paper, we propose a dynamic en-route filtering scheme for false data injection attacks in wireless sensor networks. In sensor networks, adversaries can inject false da...
Zhen Yu, Yong Guan
POPL
2010
ACM
14 years 5 months ago
Static Determination of Quantitative Resource Usage for Higher-Order Programs
We describe a new automatic static analysis for determining upper-bound functions on the use of quantitative resources for strict, higher-order, polymorphic, recursive programs de...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
JUCS
2008
147views more  JUCS 2008»
13 years 8 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...