Sciweavers

143 search results - page 5 / 29
» Strategies against Replay Attacks
Sort
View
COMPSEC
2006
94views more  COMPSEC 2006»
13 years 7 months ago
A novel remote user authentication scheme using bilinear pairings
Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.'s scheme and mad...
Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati...
AVBPA
2005
Springer
319views Biometrics» more  AVBPA 2005»
14 years 1 months ago
A Study of Brute-Force Break-ins of a Palmprint Verification System
Abstract. Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has le...
Adams Wai-Kin Kong, David Zhang, Mohamed Kamel
CEC
2005
IEEE
14 years 1 months ago
Finding attack strategies for predator swarms using genetic algorithms
Abstract- Behavior based architectures have many parameters that must be tuned to produce effective and believable agents. We use genetic algorithms to tune simple behavior based c...
Ryan E. Leigh, Tony Morelli, Sushil J. Louis, Moni...
APCHI
2008
IEEE
14 years 1 months ago
Denial of Sleeping: Performance Analysis and Counteracting Strategy
Denial of Sleeping is a novel type of potential attacks in wireless network. The object of the attack is a sensor node’s power supply. To make sensors inexpensive so that they ca...
Vladimir V. Shakhov, Hyunseung Choo
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 7 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert