Sciweavers

1294 search results - page 9 / 259
» Securing Against Insider Attacks
Sort
View
ICDCS
2008
IEEE
15 years 10 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
170
Voted
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
108
Voted
ACISP
2001
Springer
15 years 8 months ago
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
131
Voted
CCS
2008
ACM
15 years 6 months ago
Adaptive distributed mechanism against flooding network attacks based on machine learning
Josep Lluis Berral, Nicolás Poggi, Javier A...
EUROCRYPT
2009
Springer
16 years 4 months ago
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
Jan Camenisch, Nishanth Chandran, Victor Shoup