Sciweavers

468 search results - page 72 / 94
» Security Weaknesses in Bluetooth
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICCSA
2007
Springer
14 years 3 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
ACSAC
2006
IEEE
14 years 2 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
STORAGESS
2006
ACM
14 years 2 months ago
The case for semantic aware remote replication
This paper argues that the network latency due to synchronous replication is no longer tolerable in scenarios where businesses are required by regulation to separate their seconda...
Xiaotao Liu, Gal Niv, Prashant J. Shenoy, K. K. Ra...
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
14 years 2 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...