Sciweavers

113 search results - page 5 / 23
» Attacks on physical-layer identification
Sort
View
76
Voted
EUROCRYPT
2001
Springer
15 years 4 months ago
Identification Protocols Secure against Reset Attacks
Abstract. We provide identi£cation protocols that are secure even when the adversary can reset the internal state and/or randomization source of the user identifying itself, and w...
Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Si...
54
Voted
IJCSA
2008
60views more  IJCSA 2008»
14 years 11 months ago
Traffic Analysis Based Identification of Attacks
Dima Novikov, Roman V. Yampolskiy, Leon Reznik
IEICET
2007
46views more  IEICET 2007»
14 years 11 months ago
Identification of Attack Nodes from Traffic Matrix Estimation
Yuichi Ohsita, Shingo Ata, Masayuki Murata
125
Voted
TIFS
2011
253views Education» more  TIFS 2011»
14 years 6 months ago
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
—Sensor photo-response non-uniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including digital-camera ballistics in which an image is ...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen