Sciweavers

252 search results - page 10 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
14 years 12 days ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 3 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
CRITIS
2007
13 years 10 months ago
Detecting DNS Amplification Attacks
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Georgios Kambourakis, Tassos Moschos, Dimitris Gen...
JDFP
2006
139views more  JDFP 2006»
13 years 8 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
VTC
2006
IEEE
118views Communications» more  VTC 2006»
14 years 2 months ago
Demodulation and Performance Analysis of Differential Unitary Space-Time Modulation in Time-Varying Rician Channels
Abstract— Studies on differential unitary space-time modulation are mostly focused on Rayleigh fading channels. In this paper we present new analytic results for the maximum-like...
Haichang Sui, James R. Zeidler