Sciweavers

429 search results - page 35 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
IPCCC
2007
IEEE
14 years 2 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
ASIACRYPT
2000
Springer
14 years 15 days ago
Power Analysis, What Is Now Possible...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Mehdi-Laurent Akkar, Régis Bevan, Paul Disc...
NN
2000
Springer
177views Neural Networks» more  NN 2000»
13 years 8 months ago
Independent component analysis: algorithms and applications
A fundamental problem in neural network research, as well as in many other disciplines, is finding a suitable representation of multivariate data, i.e. random vectors. For reasons...
Aapo Hyvärinen, Erkki Oja
ADHOC
2008
132views more  ADHOC 2008»
13 years 8 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
INFOCOM
2005
IEEE
14 years 1 months ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu