Sciweavers

57 search results - page 9 / 12
» Solutions to the GSM Security Weaknesses
Sort
View
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 2 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
COMCOM
2010
129views more  COMCOM 2010»
13 years 7 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 5 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
ACSAC
2006
IEEE
14 years 1 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
14 years 1 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...