Sciweavers

252 search results - page 16 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
EUC
2008
Springer
13 years 10 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
13 years 9 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
INFOCOM
2005
IEEE
14 years 2 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
SASN
2004
ACM
14 years 2 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
ICDCSW
2003
IEEE
14 years 1 months ago
IEEE 802.11 Ad Hoc Networks: Performance Measurements
 In this paper we investigate the performance of IEEE 802.11 ad hoc networks by means of an experimental study. Measurements on IEEE 802.11 ad hoc networks confirm previous sim...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...