Sciweavers

94 search results - page 9 / 19
» Side Channel Attacks on Message Authentication Codes
Sort
View
CASES
2010
ACM
13 years 7 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
TCOM
2011
118views more  TCOM 2011»
13 years 3 months ago
A Joint Network and Channel Coding Strategy for Wireless Decode-and-Forward Relay Networks
—In this paper, we consider a wireless multicast network with multiple sources, relays, and destinations. We adopt a multi-hop decode-and-forward relay protocol such that two can...
Qiang Li, See Ho Ting, Chin Keong Ho
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
CORR
2011
Springer
178views Education» more  CORR 2011»
13 years 16 days ago
Message and State Cooperation in a Relay Channel When the Relay Has Strictly Causal State Information
—A state-dependent relay channel is studied in which strictly causal channel state information is available at the relay and no state information is available at the source and d...
Min Li, Osvaldo Simeone, Aylin Yener
ICCSA
2010
Springer
14 years 3 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim