Sciweavers

20 search results - page 2 / 4
» Yet Another Attack on Vest
Sort
View
VTC
2008
IEEE
117views Communications» more  VTC 2008»
13 years 11 months ago
Remote Medical Monitoring Through Vehicular Ad Hoc Network
Several diseases and medical conditions require constant monitoring of physiological signals and vital signs on daily bases, such as diabetics, hypertension and etc. In order to m...
Hyduke Noshadi, Eugenio Giordano, Hagop Hagopian, ...
ACSAC
2004
IEEE
13 years 8 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
ICIP
2008
IEEE
14 years 6 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
ICDCS
2007
IEEE
13 years 11 months ago
Resilient Cluster Formation for Sensor Networks
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
Donggang Liu
FSE
2000
Springer
96views Cryptology» more  FSE 2000»
13 years 8 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong