In this paper, we study both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks. We first setup the models...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...