Sciweavers

143 search results - page 9 / 29
» Strategies against Replay Attacks
Sort
View
NETWORK
2006
177views more  NETWORK 2006»
13 years 7 months ago
Jamming sensor networks: attack and defense strategies
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of se...
Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang
FC
2010
Springer
145views Cryptology» more  FC 2010»
13 years 6 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
NETWORKING
2007
13 years 9 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
CEEMAS
2007
Springer
14 years 1 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
CISC
2009
Springer
185views Cryptology» more  CISC 2009»
13 years 5 months ago
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
In [10], Buchmann, Pyshkin and Weinmann have described two families of Feistel and SPN block ciphers called Flurry and Curry respectively. These two families of ciphers are fully p...
Jean-Charles Faugère, Ludovic Perret