Sciweavers

373 search results - page 10 / 75
» Two Attacks on Reduced IDEA
Sort
View
CGO
2003
IEEE
14 years 28 days ago
Predicate-Aware Scheduling: A Technique for Reducing Resource Constraints
Predicated execution enables the removal of branches wherein segments of branching code are converted into straight-line segments of conditional operations. An important, but gene...
Mikhail Smelyanskiy, Scott A. Mahlke, Edward S. Da...
IJUFKS
2002
78views more  IJUFKS 2002»
13 years 7 months ago
On the Security of Microaggregation with Individual Ranking: Analytical Attacks
Microaggregation is a statistical disclosure control technique. Raw microdata (i.e. individual records) are grouped into small aggregates prior to publication. With fixed-size grou...
Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Anna...
IJDSN
2006
114views more  IJDSN 2006»
13 years 7 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 2 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
GLOBECOM
2008
IEEE
14 years 2 months ago
Jamming ACK Attack to Wireless Networks and a Mitigation Approach
— In many Medium Access Control (MAC) schemes for wireless networks, an Acknowledgment (ACK) packet is transmitted from the data receiver to the data sender to announce the succe...
Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu