Sciweavers

163 search results - page 6 / 33
» WiFi attack vectors
Sort
View
ICDCS
2003
IEEE
14 years 3 months ago
Monotonicity and Partial Results Protection for Mobile Agents
Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
Bennet S. Yee
GLOBECOM
2009
IEEE
14 years 1 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
CRYPTO
1997
Springer
108views Cryptology» more  CRYPTO 1997»
14 years 1 months ago
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
: The McEliece public-key cryptosystem fails to protect any message which is sent to a recipient more than once using different random error vectors. In general, it fails to protec...
Thomas A. Berson
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
14 years 1 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
DIMVA
2009
13 years 10 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono