Sciweavers

507 search results - page 73 / 102
» Attacking DDoS at the Source
Sort
View
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 4 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...
SP
2008
IEEE
15 years 4 months ago
Robust De-anonymization of Large Sparse Datasets
We present a new class of statistical deanonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. ...
Arvind Narayanan, Vitaly Shmatikov
ADHOCNOW
2006
Springer
15 years 3 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
ASIACRYPT
2005
Springer
15 years 3 months ago
An Analysis of the XSL Algorithm
The XSL “algorithm” is a method for solving systems of multivariate polynomial equations based on the linearization method. It was proposed in 2002 as a dedicated method for ex...
Carlos Cid, Gaëtan Leurent
DRM
2005
Springer
15 years 3 months ago
Improved watermark detection for spread-spectrum based watermarking using independent component analysis
This paper presents an efficient blind watermark detection/decoding scheme for spread spectrum (SS) based watermarking, exploiting the fact that in SS-based embedding schemes the ...
Hafiz Malik, Ashfaq A. Khokhar, Rashid Ansari