Sciweavers

286 search results - page 16 / 58
» Analyzing the vulnerability of superpeer networks against at...
Sort
View
NSDI
2008
15 years 3 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
TWC
2010
14 years 8 months ago
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks
Abstract--Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both exp...
Konstantinos Pelechrinis, Christos Koufogiannakis,...
WS
2005
ACM
15 years 6 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
ISNN
2005
Springer
15 years 6 months ago
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the secur...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
IJISEC
2007
87views more  IJISEC 2007»
15 years 1 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis