During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of thes...
Stefan Mangard, Norbert Pramstaller, Elisabeth Osw...
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
We present e-NeXSh, a novel security approach that utilises kernel and LIBC support for efficiently defending systems against process-subversion attacks. Such attacks exploit vul...
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...