Sciweavers

1369 search results - page 66 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 2 months ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou
DBPL
2007
Springer
98views Database» more  DBPL 2007»
15 years 5 months ago
Towards Practical Typechecking for Macro Tree Transducers
Macro tree transducers (mtt) are an important model that both covers many useful XML transformations and allows decidable exact typechecking. This paper reports our first step tow...
Alain Frisch, Haruo Hosoya
PADS
2005
ACM
15 years 4 months ago
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information
Most well-known Internet worms, such as Code Red, Slammer, and Blaster, infected vulnerable computers by scanning the entire Internet IPv4 space. In this paper, we present a new s...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong...
78
Voted
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
15 years 11 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
VTC
2008
IEEE
207views Communications» more  VTC 2008»
15 years 5 months ago
Practical Results of Hybrid AOA/TDOA Geo-Location Estimation in CDMA Wireless Networks
—This paper describes a hybrid AOA/TODA Mobile Station (MS) location estimation method based on the CDMA wireless communications signals. The method utilized estimates the Angle ...
Ali Broumandan, Tao Lin, John Nielsen, Géra...