Sciweavers

268 search results - page 52 / 54
» An Adaptive Multiparty Protocol for Secure Data Protection
Sort
View
ICC
2007
IEEE
214views Communications» more  ICC 2007»
14 years 3 days ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
ICC
2007
IEEE
14 years 3 days ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj
CASES
2010
ACM
13 years 3 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
SASN
2006
ACM
13 years 11 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
AHSWN
2006
206views more  AHSWN 2006»
13 years 5 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch