Sciweavers

104 search results - page 14 / 21
» Protocol Interactions and the Chosen Protocol Attack
Sort
View
INFOCOM
2007
IEEE
14 years 1 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
13 years 11 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
PET
2010
Springer
13 years 10 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
IPPS
2006
IEEE
14 years 23 days ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 1 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov