Sciweavers

15 search results - page 3 / 3
» Threat Analysis of a Practical Voting Scheme with Receipts
Sort
View
ESORICS
2007
Springer
13 years 11 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
WISEC
2009
ACM
13 years 11 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
NDSS
2008
IEEE
13 years 11 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
WISEC
2010
ACM
13 years 9 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
BMCBI
2006
163views more  BMCBI 2006»
13 years 5 months ago
Ensemble attribute profile clustering: discovering and characterizing groups of genes with similar patterns of biological featur
Background: Ensemble attribute profile clustering is a novel, text-based strategy for analyzing a userdefined list of genes and/or proteins. The strategy exploits annotation data ...
J. R. Semeiks, A. Rizki, Mina J. Bissell, I. Saira...