Sciweavers

113 search results - page 2 / 23
» Attacks on physical-layer identification
Sort
View
INFOCOM
2012
IEEE
11 years 7 months ago
Enhanced wireless channel authentication using time-synched link signature
Abstract— Wireless link signature is a physical layer authentication mechanism, which uses the unique wireless channel characteristics between a transmitter and a receiver to pro...
Yao Liu, Peng Ning
TISSEC
2008
100views more  TISSEC 2008»
13 years 4 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
MEDIAFORENSICS
2010
13 years 6 months ago
Texture based attacks on intrinsic signature based printer identification
Several methods exist for printer identification from a printed document. We have developed a system that performs printer identification using intrinsic signatures of the printer...
Aravind K. Mikkilineni, Nitin Khanna, Edward J. De...
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
13 years 8 months ago
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
Jean-Sébastien Coron, David Naccache
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
13 years 8 months ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...