Sciweavers

29 search results - page 1 / 6
» The Power of the Defender
Sort
View
MOBIQUITOUS
2007
IEEE
13 years 11 months ago
On Adjusting Power to Defend Wireless Networks from Jamming
— Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the n...
Wenyuan Xu
ICDCSW
2006
IEEE
13 years 11 months ago
The Power of the Defender
Marina Gelastou, Marios Mavronicolas, Vicky G. Pap...
INFOCOM
2012
IEEE
11 years 7 months ago
BitTrickle: Defending against broadband and high-power reactive jamming attacks
—Reactive jamming is not only cost effective, but also hard to track and remove due to its intermittent jamming behaviors. Frequency Hopping Spread Spectrum (FHSS) and Direct Seq...
Yao Liu, Peng Ning
COMPSAC
2009
IEEE
13 years 11 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In
SACRYPT
1998
Springer
13 years 9 months ago
Mix-Based Electronic Payments
We introduce a new payment architecture that limits the power of an attacker while providing the honest user with privacy. Our proposed method defends against all known attacks on ...
Markus Jakobsson, David M'Raïhi