Sciweavers

163 search results - page 19 / 33
» WiFi attack vectors
Sort
View
RAID
2004
Springer
14 years 3 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 5 months ago
Subspace LWE
The (decisional) learning with errors problem (LWE) asks to distinguish “noisy” inner products of a secret vector with random vectors from uniform. In recent years, the LWE pro...
Krzysztof Pietrzak
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 3 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
IACR
2011
139views more  IACR 2011»
12 years 9 months ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Conditional Access to H.264/AVC Video with Drift Control
In this paper we address the problem of providing conditional access to video sequences, namely, to generate a low-quality video to be used as preview, which can be decoded at ful...
Enrico Magli, Marco Grangetto, Gabriella Olmo