Sciweavers

49 search results - page 1 / 10
» P-Coding: Secure Network Coding against Eavesdropping Attack...
Sort
View
INFOCOM
2010
IEEE
13 years 3 months ago
P-Coding: Secure Network Coding against Eavesdropping Attacks
Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, X...
WWW
2008
ACM
14 years 6 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
IPSN
2003
Springer
13 years 10 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
DIMVA
2011
12 years 8 months ago
Code Pointer Masking: Hardening Applications against Code Injection Attacks
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against a...
Pieter Philippaerts, Yves Younan, Stijn Muylle, Fr...
WIMOB
2007
IEEE
13 years 11 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius