Sciweavers

5234 search results - page 20 / 1047
» Simulation of Computer Network Attacks
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Unlinkability and Real World Constraints in RFID Systems
Unlinkability, the property that prevents an adversary recognizing whether outputs are from the same user, is an important concept in RFID. There are many proposed schemes that pr...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
ICNP
1997
IEEE
14 years 1 months ago
An experimental study of insider attacks for OSPF routing protocol
Brain Vetter, Feiyi Wang, Shyhtsun Felix Wu
ANCS
2006
ACM
13 years 11 months ago
Scalable network-based buffer overflow attack detection
Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh
WIOPT
2010
IEEE
13 years 7 months ago
Wireless jamming attacks under dynamic traffic uncertainty
Yalin Evren Sagduyu, Randall A. Berry, Anthony Eph...