Sciweavers

525 search results - page 98 / 105
» The Davies-Murphy Power Attack
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
NDSS
2006
IEEE
14 years 3 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 3 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 3 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 3 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani