Sciweavers

2699 search results - page 89 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 1 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
CRYPTO
2006
Springer
97views Cryptology» more  CRYPTO 2006»
14 years 19 days ago
Robust Multiparty Computation with Linear Communication Complexity
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Martin Hirt, Jesper Buus Nielsen
ACSAC
2007
IEEE
14 years 29 days ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...
TIFS
2008
208views more  TIFS 2008»
13 years 8 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
ECIS
2000
13 years 10 months ago
Security and Productivity Improvements - Sufficient for the Success of Secure Electronic Transaction?
Online payments in business-to-consumer electronic commerce are mainly made with credit cards. Fraud and chargebacks are a significant issue for merchants and payment card brands, ...
Michael Fritscher, Oliver Kump