Sciweavers

33 search results - page 3 / 7
» An Efficient Scheme for Securing XOR Network Coding against ...
Sort
View
CARDIS
2004
Springer
216views Hardware» more  CARDIS 2004»
13 years 11 months ago
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
Mark G. Karpovsky, Konrad J. Kulikowski, Alexander...
DATE
2007
IEEE
119views Hardware» more  DATE 2007»
14 years 4 days ago
Experimental evaluation of protections against laser-induced faults and consequences on fault modeling
Lasers can be used by hackers to situations to inject faults in circuits and induce security flaws. On-line detection mechanisms are classically proposed to counter such attacks, ...
Régis Leveugle, Abdelaziz Ammari, V. Maingo...
INFOCOM
2009
IEEE
14 years 13 days ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang
CONEXT
2007
ACM
13 years 9 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
IJISEC
2006
106views more  IJISEC 2006»
13 years 5 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis