Sciweavers

514 search results - page 36 / 103
» An active security protocol against DoS attacks
Sort
View
ISECS
2008
IEEE
15 years 6 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel

Publication
545views
15 years 8 months ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 11 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
ICDCS
2009
IEEE
15 years 9 months ago
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile envir...
Donggang Liu
STORAGESS
2005
ACM
15 years 5 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo