Sciweavers

163 search results - page 27 / 33
» WiFi attack vectors
Sort
View
CCR
2007
115views more  CCR 2007»
13 years 9 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
JUCS
2008
136views more  JUCS 2008»
13 years 9 months ago
Crime Scene Representation (2D, 3D, Stereoscopic Projection) and Classification
: In this paper we provide a study about crime scenes and its features used in criminal investigations. We argue that the crime scene provides a large set of features that can be u...
Ricardo O. Abu Hana, Cinthia Obladen de Almendra F...
IFIP12
2010
13 years 8 months ago
Learning the Preferences of News Readers with SVM and Lasso Ranking
We attack the task of predicting which news-stories are more appealing to a given audience by comparing ‘most popular stories’, gathered from various online news outlets, over ...
Elena Hensinger, Ilias N. Flaounas, Nello Cristian...
IACR
2011
112views more  IACR 2011»
12 years 9 months ago
A Domain Transformation for Structure-Preserving Signatures on Group Elements
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for signing group elements in a structure preserving way. A...
Melissa Chase, Markulf Kohlweiss
SCN
2010
Springer
122views Communications» more  SCN 2010»
13 years 8 months ago
Recursive Lattice Reduction
Abstract. Lattice reduction is known to be a very powerful tool in modern cryptanalysis. In the literature, there are many lattice reduction algorithms that have been proposed with...
Thomas Plantard, Willy Susilo