Sciweavers

704 search results - page 80 / 141
» A Practical Attack on KeeLoq
Sort
View
ADHOCNETS
2009
Springer
15 years 6 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
FC
2009
Springer
100views Cryptology» more  FC 2009»
15 years 6 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
IWSEC
2009
Springer
15 years 6 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
ICPR
2008
IEEE
15 years 6 months ago
A scene-based video watermarking technique using SVMs
In this paper we present a scene-based video watermarking scheme using support vector machines (SVMs). In a given scene, the algorithm uses the first h′ frames to train an embed...
Shwu-Huey Yen, Hsiao-Wei Chang, Chia-Jen Wang, Pat...
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 6 months ago
A Dynamic Stateful Multicast Firewall
—Enterprises are faced with the challenge of enabling IP multicast applications without exposing their network to multicast denial-of-service attacks. Current practice is to use ...
Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig...