Sciweavers

143 search results - page 7 / 29
» Strategies against Replay Attacks
Sort
View
JCM
2008
69views more  JCM 2008»
13 years 7 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
14 years 21 days ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell
INFOCOM
2007
IEEE
14 years 1 months ago
Addressing Click Fraud in Content Delivery Systems
—Mechanisms for data access and payment are central to the success of content delivery systems. However, not much attention has been paid to the issues of dishonest intermediarie...
Saugat Majumdar, Dhananjay Kulkarni, Chinya V. Rav...
CORR
2011
Springer
182views Education» more  CORR 2011»
13 years 2 months ago
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and adv...
Fabio Pasqualetti, Florian Dörfler, Francesco...
GRID
2006
Springer
13 years 7 months ago
A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems
In the paper we present a framework for the secure end-to-end delivery of messages in distributed messaging infrastructures based on the publish/subscribe paradigm. The framework ...
Shrideep Pallickara, Marlon E. Pierce, Harshawardh...