Sciweavers

163 search results - page 7 / 33
» WiFi attack vectors
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
A new data hiding method using angle quantization index modulation in gradient domain
A robust data hiding scheme that embeds the watermark bits by quantizing the gradient directions of an image is proposed. By embedding the watermark in the angle, the watermark be...
Ehsan Nezhadarya, Z. Jane Wang, Rabab K. Ward
GLOBECOM
2006
IEEE
14 years 3 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
ADHOC
2005
134views more  ADHOC 2005»
13 years 9 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
ICASSP
2008
IEEE
14 years 4 months ago
Robust video fingerprints based on subspace embedding
We present a novel video fingerprinting method based on subspace embedding. The proposed method is particularly robust against frame-rate conversion attacks and geometric attacks...
Regunathan Radhakrishnan, Claus Bauer
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
14 years 10 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg