Sciweavers

372 search results - page 23 / 75
» On the Security of a Unified Countermeasure
Sort
View
JIPS
2010
389views more  JIPS 2010»
13 years 2 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
FPL
2003
Springer
88views Hardware» more  FPL 2003»
14 years 26 days ago
How Secure Are FPGAs in Cryptographic Applications?
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPG...
Thomas J. Wollinger, Christof Paar
WISTP
2010
Springer
14 years 2 months ago
Security Analysis of Mobile Phones Used as OTP Generators
Abstract. The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the prot...
Håvard Raddum, Lars Hopland Nestås, Kj...
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
14 years 1 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
DAC
2006
ACM
13 years 11 months ago
IMPRES: integrated monitoring for processor reliability and security
Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even `trusted so...
Roshan G. Ragel, Sri Parameswaran