Sciweavers

252 search results - page 14 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 8 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
CEEMAS
2007
Springer
14 years 2 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
INFOCOM
2011
IEEE
13 years 11 days ago
A dynamic game solution to malware attack
—Given the flexibility that software-based operation provides, it is unreasonable to expect that new malware will demonstrate a fixed behavior over time. Instead, malware can d...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
JSAC
2007
87views more  JSAC 2007»
13 years 8 months ago
Performance Analysis of Scheduling in Multiuser MIMO Systems with Zero-Forcing Receivers
— Despite its low-complexity, the zero-forcing receiver is known to suffer from noise enhancement to restore the spatially multiplexed data in a single-user MIMO system. Neverthe...
Chiung-Jang Chen, Li-Chun Wang
ENTCS
2007
145views more  ENTCS 2007»
13 years 8 months ago
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Wireless sensor networks are comprised of a vast number of ultra-small autonomous computing, communication and sensing devices, with restricted energy and computing capabilities, ...
Ioannis Chatzigiannakis, Elisavet Konstantinou, Va...