Sciweavers

832 search results - page 3 / 167
» Effect of Malicious Synchronization
Sort
View
JSAC
2006
167views more  JSAC 2006»
13 years 5 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
JCM
2008
138views more  JCM 2008»
13 years 5 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
ACSAC
2002
IEEE
13 years 10 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
13 years 9 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
ICC
2007
IEEE
111views Communications» more  ICC 2007»
13 years 11 months ago
Automatically Segregating Greedy and Malicious Internet Flows
— In the current Internet, compliance with TCP congestion control rules is voluntary. Noncompliant flows can gain unfair performance advantages or deny service to other flows. ...
José Carlos Brustoloni, Shuo Chen