Sciweavers

315 search results - page 19 / 63
» Number Theoretic Attacks on Secure Password Schemes
Sort
View
IWDW
2004
Springer
14 years 1 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
EUC
2007
Springer
14 years 1 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
CCS
2007
ACM
14 years 1 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
INDOCRYPT
2003
Springer
14 years 25 days ago
Security Analysis of Several Group Signature Schemes
At Eurocrypt’91, Chaum and van Heyst introduced the concept of group signature. In such a scheme, each group member is allowed to sign messages on behalf of a group anonymously. ...
Guilin Wang
WIMOB
2008
IEEE
14 years 2 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...